Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
506d442f550ae7277c111faa9d7bde6f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
506d442f550ae7277c111faa9d7bde6f.exe
Resource
win10v2004-20231215-en
General
-
Target
506d442f550ae7277c111faa9d7bde6f.exe
-
Size
506KB
-
MD5
506d442f550ae7277c111faa9d7bde6f
-
SHA1
d2188d5ecd021a2eedc19001ac06e510638b4100
-
SHA256
a832c6c96a31075ab3f04e37f40e542d75c5f7b88e80574e283845bd35a01d11
-
SHA512
b545b4d33266db0f30ce9e6d0eb10a4076800e2cea77752c513ab20673cff63b99b5c4b9388795ae3b9755eea99aa6ef17dd5e1419980c728bcacc785cc12b17
-
SSDEEP
12288:KFDI9l8n7+kgyp4vaDD+TPMbJM5UzRXzui3UDuZjNG2wzLDiOcy:xs7+k/KaDWUxz9v3PNx8l
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1504 506d442f550ae7277c111faa9d7bde6f.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 506d442f550ae7277c111faa9d7bde6f.exe -
Loads dropped DLL 1 IoCs
pid Process 2920 506d442f550ae7277c111faa9d7bde6f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1504 506d442f550ae7277c111faa9d7bde6f.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1504 506d442f550ae7277c111faa9d7bde6f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2920 506d442f550ae7277c111faa9d7bde6f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2920 506d442f550ae7277c111faa9d7bde6f.exe 1504 506d442f550ae7277c111faa9d7bde6f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2920 wrote to memory of 1504 2920 506d442f550ae7277c111faa9d7bde6f.exe 28 PID 2920 wrote to memory of 1504 2920 506d442f550ae7277c111faa9d7bde6f.exe 28 PID 2920 wrote to memory of 1504 2920 506d442f550ae7277c111faa9d7bde6f.exe 28 PID 2920 wrote to memory of 1504 2920 506d442f550ae7277c111faa9d7bde6f.exe 28 PID 1504 wrote to memory of 2808 1504 506d442f550ae7277c111faa9d7bde6f.exe 29 PID 1504 wrote to memory of 2808 1504 506d442f550ae7277c111faa9d7bde6f.exe 29 PID 1504 wrote to memory of 2808 1504 506d442f550ae7277c111faa9d7bde6f.exe 29 PID 1504 wrote to memory of 2808 1504 506d442f550ae7277c111faa9d7bde6f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\506d442f550ae7277c111faa9d7bde6f.exe"C:\Users\Admin\AppData\Local\Temp\506d442f550ae7277c111faa9d7bde6f.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\506d442f550ae7277c111faa9d7bde6f.exeC:\Users\Admin\AppData\Local\Temp\506d442f550ae7277c111faa9d7bde6f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\506d442f550ae7277c111faa9d7bde6f.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD519916d215351bc0b9dfe28be61846280
SHA16d5d0464ccd6e80c1cbea71ee185f82084fe6946
SHA2563bd48748d238b9e146e85c7a12303559b3d77a7cb3280bb2f5566d146be80c13
SHA512421e1608202ca55682c441c38f64b0845d59f869d35d81196c4789b32566d4f7f04e875dc21f74d5ceb9542f0eb67c1acc8a89121460e564c4fe22891b334bd3
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
166KB
MD5871ee9628a3c797b52d04407c67632b1
SHA109021045ee4d910338cf70372a2caa62e840874a
SHA25605aaec20b178cb7b635976e2d7064fa6eeee12044bb1b623bfaa6376d14e742d
SHA512cf1bba4395cfc752e3dd07abd92ded62d27f99a71f2c127850e852c8b7bb42bb3d10fde59311c5ab9558686556eff26d90ec4b0757edff857a3d537b59516166
-
Filesize
285KB
MD56bf42e900aa9c4b32d04aafdb38494cb
SHA1f9a92928fab068c741be4726e9e11d5e6e3724d7
SHA256154c3bea2040fa49b7e3c8022b3791d23283b4b1f9a7dec8d3e6622caf462e7c
SHA51208784cf1a05ee454d8d2f154220ff07ab486a0d226b6799c9445275969afa4a698f4589eddb821c87312950c99a99a09257f952856e12a4e1e08ee3506c819fc