Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
72b68ae69c6f6afe3ed3c412af579cf0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72b68ae69c6f6afe3ed3c412af579cf0.exe
Resource
win10v2004-20231215-en
General
-
Target
72b68ae69c6f6afe3ed3c412af579cf0.exe
-
Size
1000KB
-
MD5
72b68ae69c6f6afe3ed3c412af579cf0
-
SHA1
cfcd80a9c589c2f43b83f6ea778fc8d46e98a2c8
-
SHA256
e9f46417210b56c17ebc3efff1b3ce58362062590abc803c4f121e0039490827
-
SHA512
a0090ba524708b3b18012f6150a8a0a10158f1b968880f8234551e803476e43532d172907c6d10300929b9c68d9555ae75323834f86abb7fe81f7b8f63540d95
-
SSDEEP
24576:rlGkQHzXMs6JLCpXkay1B+5vMiqt0gj2ed:ZhczXMsIsXkaYqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4464 72b68ae69c6f6afe3ed3c412af579cf0.exe -
Executes dropped EXE 1 IoCs
pid Process 4464 72b68ae69c6f6afe3ed3c412af579cf0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4464 72b68ae69c6f6afe3ed3c412af579cf0.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4464 72b68ae69c6f6afe3ed3c412af579cf0.exe 4464 72b68ae69c6f6afe3ed3c412af579cf0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4520 72b68ae69c6f6afe3ed3c412af579cf0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4520 72b68ae69c6f6afe3ed3c412af579cf0.exe 4464 72b68ae69c6f6afe3ed3c412af579cf0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4520 wrote to memory of 4464 4520 72b68ae69c6f6afe3ed3c412af579cf0.exe 87 PID 4520 wrote to memory of 4464 4520 72b68ae69c6f6afe3ed3c412af579cf0.exe 87 PID 4520 wrote to memory of 4464 4520 72b68ae69c6f6afe3ed3c412af579cf0.exe 87 PID 4464 wrote to memory of 4620 4464 72b68ae69c6f6afe3ed3c412af579cf0.exe 90 PID 4464 wrote to memory of 4620 4464 72b68ae69c6f6afe3ed3c412af579cf0.exe 90 PID 4464 wrote to memory of 4620 4464 72b68ae69c6f6afe3ed3c412af579cf0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\72b68ae69c6f6afe3ed3c412af579cf0.exe"C:\Users\Admin\AppData\Local\Temp\72b68ae69c6f6afe3ed3c412af579cf0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\72b68ae69c6f6afe3ed3c412af579cf0.exeC:\Users\Admin\AppData\Local\Temp\72b68ae69c6f6afe3ed3c412af579cf0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\72b68ae69c6f6afe3ed3c412af579cf0.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD589ccb19248ae496911da95dc16bf152b
SHA1fd49b771c1075f9e6c99775bbd21e42826536ca9
SHA2567a87f98a96695b39f8a164dc46e87ab25134cb7cbfbb34c8852cf001998f3ca4
SHA51291676ed3ace80dd980246e4a066cd49676192ee8e8b5106bae1509ea89f0c4a0b6bfb3f3abf7283a1936790a29b6bd85f52dc2b3c256de826c40840d0fad87fe