Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
5803ecc0e58ceaaf7fae8fd93bda9fe3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5803ecc0e58ceaaf7fae8fd93bda9fe3.exe
Resource
win10v2004-20231222-en
General
-
Target
5803ecc0e58ceaaf7fae8fd93bda9fe3.exe
-
Size
1000KB
-
MD5
5803ecc0e58ceaaf7fae8fd93bda9fe3
-
SHA1
573545a0ea1f8f1e295b52f2d2e640f91085f559
-
SHA256
f203662a913d5098e3992adb1149ec6d51e0630ad9068c7aada05c24cfde2c53
-
SHA512
f8362ccae6828eb668fde7e6c27c3da5c9aad0f380d867341096ff70e2e3c146f85aba7263c55e17bd4719bfd260ef8bc29025c41759c47a9e48298dd5bd5099
-
SSDEEP
24576:p70nUTYCj9g7RJAxiJHDUxyRf5i1B+5vMiqt0gj2ed:pInUcCj9gtJ1jUgRf5oqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1192 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe -
Executes dropped EXE 1 IoCs
pid Process 1192 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1192 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5020 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1192 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe 1192 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3964 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3964 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe 1192 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3964 wrote to memory of 1192 3964 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe 37 PID 3964 wrote to memory of 1192 3964 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe 37 PID 3964 wrote to memory of 1192 3964 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe 37 PID 1192 wrote to memory of 5020 1192 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe 46 PID 1192 wrote to memory of 5020 1192 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe 46 PID 1192 wrote to memory of 5020 1192 5803ecc0e58ceaaf7fae8fd93bda9fe3.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\5803ecc0e58ceaaf7fae8fd93bda9fe3.exe"C:\Users\Admin\AppData\Local\Temp\5803ecc0e58ceaaf7fae8fd93bda9fe3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\5803ecc0e58ceaaf7fae8fd93bda9fe3.exeC:\Users\Admin\AppData\Local\Temp\5803ecc0e58ceaaf7fae8fd93bda9fe3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\5803ecc0e58ceaaf7fae8fd93bda9fe3.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:5020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5caabe1362decad22ba4a57a59c12fd52
SHA1d55cfb3143b4ea663869af6e2a512017831647eb
SHA256bcf53b92820addd20157b13df74ef61b9b0361cc254d66f07b41e76886102ddb
SHA5126ee30dd0af91cbea998bba5eb397548da62ffb516ebb9fd655677bdad0811c4847f0892fac8823da91c498bf688cda8667c99febd26ed8d2b97599fb1d704f27