Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
7b893bf1dda3ee222f06e14a1ec89424.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b893bf1dda3ee222f06e14a1ec89424.exe
Resource
win10v2004-20231222-en
General
-
Target
7b893bf1dda3ee222f06e14a1ec89424.exe
-
Size
1000KB
-
MD5
7b893bf1dda3ee222f06e14a1ec89424
-
SHA1
78b4fe89dfb4ebb0521592385b2d0a48d557a9bc
-
SHA256
c70394b949520a9056a0db7a6ad5dbdb167db2fa14eb7e70231627aed22b293a
-
SHA512
7b051d78398363e06823859f3d8c311da99c941c8c83b97167a74942a0a8f14085c5d8c3919404fc7fec0e5703d3a1fdd2098c7eb7650bc76b816b92ec5c5b88
-
SSDEEP
12288:Lxmcxdys42nntxTD1AQ1wQVMCsvRwzECaBwQ2tb5JLrnylUPqt0gHDS7eyod:/hxTD1d1wQVMNvRV1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2444 7b893bf1dda3ee222f06e14a1ec89424.exe -
Executes dropped EXE 1 IoCs
pid Process 2444 7b893bf1dda3ee222f06e14a1ec89424.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 pastebin.com 13 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2444 7b893bf1dda3ee222f06e14a1ec89424.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3292 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2444 7b893bf1dda3ee222f06e14a1ec89424.exe 2444 7b893bf1dda3ee222f06e14a1ec89424.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 236 7b893bf1dda3ee222f06e14a1ec89424.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 236 7b893bf1dda3ee222f06e14a1ec89424.exe 2444 7b893bf1dda3ee222f06e14a1ec89424.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 236 wrote to memory of 2444 236 7b893bf1dda3ee222f06e14a1ec89424.exe 58 PID 236 wrote to memory of 2444 236 7b893bf1dda3ee222f06e14a1ec89424.exe 58 PID 236 wrote to memory of 2444 236 7b893bf1dda3ee222f06e14a1ec89424.exe 58 PID 2444 wrote to memory of 3292 2444 7b893bf1dda3ee222f06e14a1ec89424.exe 77 PID 2444 wrote to memory of 3292 2444 7b893bf1dda3ee222f06e14a1ec89424.exe 77 PID 2444 wrote to memory of 3292 2444 7b893bf1dda3ee222f06e14a1ec89424.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b893bf1dda3ee222f06e14a1ec89424.exe"C:\Users\Admin\AppData\Local\Temp\7b893bf1dda3ee222f06e14a1ec89424.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\7b893bf1dda3ee222f06e14a1ec89424.exeC:\Users\Admin\AppData\Local\Temp\7b893bf1dda3ee222f06e14a1ec89424.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\7b893bf1dda3ee222f06e14a1ec89424.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD51d7f4822352c5f7322b9fabb750eafb6
SHA115ecf6c2ea117dc542cf0ff2a706e82852bc8957
SHA25636e8ccef81e20a4d8501cdb452298bd3cd609262fa22fda7d75f209d0c0d5e30
SHA5124bd7189a4297133940d0cb0872dab8fd6ffb2ce8668919bb0caa12d62bb811c33ca40f4cca1ecfd8665e880915b3c9c251cc024a5786c5fabd22e4e8841269e0