Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
76c1acfde631664b678815a7d3c08418.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76c1acfde631664b678815a7d3c08418.exe
Resource
win10v2004-20231215-en
General
-
Target
76c1acfde631664b678815a7d3c08418.exe
-
Size
1000KB
-
MD5
76c1acfde631664b678815a7d3c08418
-
SHA1
3a346fa9d58135dccfe1bd6ddba54de63485720a
-
SHA256
48da6b256c719f7328c57a4d2a617e4a8c5e74bdead1f0cca0439cd4ffe31238
-
SHA512
bb75764bcd457f9feafeb558cce417bae080bd31d9ecd54d12c8684ac5fb66040624ecca469bfd15fbb278cd5820522bf1cb273a05e9c5f18fb5f0bed09afeb2
-
SSDEEP
24576:ps95C8GtBuS77WG//o8vG1B+5vMiqt0gj2ed:psB4TZ/xvkqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2344 76c1acfde631664b678815a7d3c08418.exe -
Executes dropped EXE 1 IoCs
pid Process 2344 76c1acfde631664b678815a7d3c08418.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 9 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2344 76c1acfde631664b678815a7d3c08418.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2344 76c1acfde631664b678815a7d3c08418.exe 2344 76c1acfde631664b678815a7d3c08418.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4876 76c1acfde631664b678815a7d3c08418.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4876 76c1acfde631664b678815a7d3c08418.exe 2344 76c1acfde631664b678815a7d3c08418.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4876 wrote to memory of 2344 4876 76c1acfde631664b678815a7d3c08418.exe 86 PID 4876 wrote to memory of 2344 4876 76c1acfde631664b678815a7d3c08418.exe 86 PID 4876 wrote to memory of 2344 4876 76c1acfde631664b678815a7d3c08418.exe 86 PID 2344 wrote to memory of 1632 2344 76c1acfde631664b678815a7d3c08418.exe 89 PID 2344 wrote to memory of 1632 2344 76c1acfde631664b678815a7d3c08418.exe 89 PID 2344 wrote to memory of 1632 2344 76c1acfde631664b678815a7d3c08418.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\76c1acfde631664b678815a7d3c08418.exe"C:\Users\Admin\AppData\Local\Temp\76c1acfde631664b678815a7d3c08418.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\76c1acfde631664b678815a7d3c08418.exeC:\Users\Admin\AppData\Local\Temp\76c1acfde631664b678815a7d3c08418.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\76c1acfde631664b678815a7d3c08418.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD55a26a11f15ab7dba66d68c0faf4a0794
SHA1bc8927b0b7426d3993231a0dd21dba740729b069
SHA256daf4393acea3398d6cb19a0c69d2cbc9cd5df222762075ad095b92805854e0fc
SHA5123df1c5dea9b612a880c684ffe20eec2da7c2e0841d91a8447de9cdb4dc7e3cafc0ef0f3d8d22105a06354dccbf81876ec90bb9ce8610ac91eaf37105ffbe3f96