Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
67f24f2e800017f7ea47e9a3a1d80c21.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67f24f2e800017f7ea47e9a3a1d80c21.exe
Resource
win10v2004-20231222-en
General
-
Target
67f24f2e800017f7ea47e9a3a1d80c21.exe
-
Size
242KB
-
MD5
67f24f2e800017f7ea47e9a3a1d80c21
-
SHA1
b2378ea5b5e39ee9e414a43d177fd7e80336f55c
-
SHA256
0dec7ce332f469c29e665117cbd9eeb43f69aab8ad33c2c5f13eb9952579d711
-
SHA512
fabc5c3a6980c13d2dee0b8df5a2e620822e4e7d53c45a7030f3c8114d59fd27c6aa7ff0f4cec994d0a7435514d7f013baa15eb5a1e832733ec749d311fed72c
-
SSDEEP
6144:12r51dhuZVXsdVIRPiGdDrIR6B7nWwtGWfHCFor7O:QLnuHXmVIticDpB7WAGV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2980 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Loads dropped DLL 1 IoCs
pid Process 2856 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2980 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2980 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2856 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2856 67f24f2e800017f7ea47e9a3a1d80c21.exe 2980 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2980 2856 67f24f2e800017f7ea47e9a3a1d80c21.exe 13 PID 2856 wrote to memory of 2980 2856 67f24f2e800017f7ea47e9a3a1d80c21.exe 13 PID 2856 wrote to memory of 2980 2856 67f24f2e800017f7ea47e9a3a1d80c21.exe 13 PID 2856 wrote to memory of 2980 2856 67f24f2e800017f7ea47e9a3a1d80c21.exe 13 PID 2980 wrote to memory of 2660 2980 67f24f2e800017f7ea47e9a3a1d80c21.exe 14 PID 2980 wrote to memory of 2660 2980 67f24f2e800017f7ea47e9a3a1d80c21.exe 14 PID 2980 wrote to memory of 2660 2980 67f24f2e800017f7ea47e9a3a1d80c21.exe 14 PID 2980 wrote to memory of 2660 2980 67f24f2e800017f7ea47e9a3a1d80c21.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exe"C:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exeC:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD58ff6825329be26da9ccd16ad03000d78
SHA1888b71aad18e74a8104fee0c926cc63446d1455e
SHA2564af0980cf3e6e95529f8e5c4d69fc9d1ddecde6ce2ef3609ddaeee9c32013990
SHA5129487b30fc60961f068c4bc657bbea779ff03abaf20b2962b8195f7b53242b8e3780cbe625ddb2e2b815d50127285104f05b6b017b311df2ec62dcde832af46e4