Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 14:56 UTC
Static task
static1
Behavioral task
behavioral1
Sample
77a883b974e7025c7737b512c1c96b5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77a883b974e7025c7737b512c1c96b5d.exe
Resource
win10v2004-20231215-en
General
-
Target
77a883b974e7025c7737b512c1c96b5d.exe
-
Size
1000KB
-
MD5
77a883b974e7025c7737b512c1c96b5d
-
SHA1
8936c128d632b35f4f604ed11f9039da01d2cbb6
-
SHA256
59a066c642007593a1965cefe67952c5574e6177c891c64bce706ae6269a4bce
-
SHA512
73590622a499374c3eee355c1b6687f0fce94e9bb88fda97f64042d1feafa09beee661c6fb98f7996747968152866759c948f727464a88b571f99d1f65c68bdc
-
SSDEEP
12288:E/uCdmWxpjq2wHdBl/eRvIFLJ9VfObosECaBwQ2tb5JLrnylUPqt0gHDS7eyod:9kBwroRSLJ2on1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2416 77a883b974e7025c7737b512c1c96b5d.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 77a883b974e7025c7737b512c1c96b5d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 13 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2416 77a883b974e7025c7737b512c1c96b5d.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2416 77a883b974e7025c7737b512c1c96b5d.exe 2416 77a883b974e7025c7737b512c1c96b5d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4352 77a883b974e7025c7737b512c1c96b5d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4352 77a883b974e7025c7737b512c1c96b5d.exe 2416 77a883b974e7025c7737b512c1c96b5d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4352 wrote to memory of 2416 4352 77a883b974e7025c7737b512c1c96b5d.exe 85 PID 4352 wrote to memory of 2416 4352 77a883b974e7025c7737b512c1c96b5d.exe 85 PID 4352 wrote to memory of 2416 4352 77a883b974e7025c7737b512c1c96b5d.exe 85 PID 2416 wrote to memory of 3536 2416 77a883b974e7025c7737b512c1c96b5d.exe 89 PID 2416 wrote to memory of 3536 2416 77a883b974e7025c7737b512c1c96b5d.exe 89 PID 2416 wrote to memory of 3536 2416 77a883b974e7025c7737b512c1c96b5d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\77a883b974e7025c7737b512c1c96b5d.exe"C:\Users\Admin\AppData\Local\Temp\77a883b974e7025c7737b512c1c96b5d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\77a883b974e7025c7737b512c1c96b5d.exeC:\Users\Admin\AppData\Local\Temp\77a883b974e7025c7737b512c1c96b5d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\77a883b974e7025c7737b512c1c96b5d.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3536
-
-
Network
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.KQbQr18KnR.comIN AResponse
-
Remote address:8.8.8.8:53Requestw.google.comIN AResponsew.google.comIN CNAMEwww3.l.google.comwww3.l.google.comIN A216.58.201.110
-
Remote address:216.58.201.110:80RequestGET / HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Accept: */*, ???@, ??????????????
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Host: w.google.com
ResponseHTTP/1.1 404 Not Found
Referrer-Policy: no-referrer
Content-Length: 1561
Date: Fri, 26 Jan 2024 14:56:24 GMT
-
Remote address:8.8.8.8:53Requestpastebin.comIN AResponsepastebin.comIN A104.20.68.143pastebin.comIN A104.20.67.143pastebin.comIN A172.67.34.170
-
Remote address:104.20.68.143:80RequestGET /raw/ubFNTPjt HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Accept: */*, ???@, ??????????????
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Host: pastebin.com
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Fri, 26 Jan 2024 15:56:24 GMT
Location: https://pastebin.com/raw/ubFNTPjt
Server: cloudflare
CF-RAY: 84b99a372dbd889b-LHR
-
Remote address:104.20.68.143:443RequestGET /raw/ubFNTPjt HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Accept: */*, ???@, ??????????????
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Host: pastebin.com
ResponseHTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
x-frame-options: DENY
x-frame-options: DENY
x-content-type-options: nosniff
x-content-type-options: nosniff
x-xss-protection: 1;mode=block
x-xss-protection: 1;mode=block
cache-control: public, max-age=1801
CF-Cache-Status: HIT
Age: 1658
Server: cloudflare
CF-RAY: 84b99a388b3076cf-LHR
-
Remote address:8.8.8.8:53Request209.178.17.96.in-addr.arpaIN PTRResponse209.178.17.96.in-addr.arpaIN PTRa96-17-178-209deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request143.68.20.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request74.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request177.178.17.96.in-addr.arpaIN PTRResponse177.178.17.96.in-addr.arpaIN PTRa96-17-178-177deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request175.178.17.96.in-addr.arpaIN PTRResponse175.178.17.96.in-addr.arpaIN PTRa96-17-178-175deploystaticakamaitechnologiescom
-
462 B 1.9kB 5 4
HTTP Request
GET http://w.google.com/HTTP Response
404 -
474 B 424 B 5 3
HTTP Request
GET http://pastebin.com/raw/ubFNTPjtHTTP Response
301 -
901 B 4.6kB 8 8
HTTP Request
GET https://pastebin.com/raw/ubFNTPjtHTTP Response
404
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
64 B 137 B 1 1
DNS Request
www.KQbQr18KnR.com
-
58 B 95 B 1 1
DNS Request
w.google.com
DNS Response
216.58.201.110
-
58 B 106 B 1 1
DNS Request
pastebin.com
DNS Response
104.20.68.143104.20.67.143172.67.34.170
-
72 B 137 B 1 1
DNS Request
209.178.17.96.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
143.68.20.104.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
74.32.126.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
13.86.106.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
177.178.17.96.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
175.178.17.96.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD59794bafe6556ee87432d6477a13c4cef
SHA1ae412267571e366f5c2576ee72793a8839b4e86a
SHA256455c19702d1731b60d6f64557057a41588c4423e06394c8d8e26ae32ddc848d5
SHA512c1bd1b21308ac1a51d7b493b7d70802e86a19da4cd098c32dda4e33a42bc8852f5a008fa6ecc553cbbad9115264403aa3a11cc5549db05b26e90c9bad60a2ded