Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
87d41e3c36eb1c75172e3183b05a9a34.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
87d41e3c36eb1c75172e3183b05a9a34.exe
Resource
win10v2004-20231215-en
General
-
Target
87d41e3c36eb1c75172e3183b05a9a34.exe
-
Size
1000KB
-
MD5
87d41e3c36eb1c75172e3183b05a9a34
-
SHA1
5db1be24b938d72557fc2bb97de16fc388ba051b
-
SHA256
b3677abdb0059cce8678249bd498b5471b8fb1a947aaa597511628bd8946a416
-
SHA512
0970d6bbdd4739cc2a4528d76b07d9b87b6504b169aabc0875c01c6e99b6fc06ebb3807eb51af8836e33ee91c758cc6c465c9a90cfe7785e3c421a44970c7d9f
-
SSDEEP
24576:FhKe8Kc4BhLMSjZxObfl+dl7L3fX+1B+5vMiqt0gj2ed:FhKet3BmSt8fl+dlnPXMqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4380 87d41e3c36eb1c75172e3183b05a9a34.exe -
Executes dropped EXE 1 IoCs
pid Process 4380 87d41e3c36eb1c75172e3183b05a9a34.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 pastebin.com 12 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4380 87d41e3c36eb1c75172e3183b05a9a34.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4380 87d41e3c36eb1c75172e3183b05a9a34.exe 4380 87d41e3c36eb1c75172e3183b05a9a34.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3692 87d41e3c36eb1c75172e3183b05a9a34.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3692 87d41e3c36eb1c75172e3183b05a9a34.exe 4380 87d41e3c36eb1c75172e3183b05a9a34.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3692 wrote to memory of 4380 3692 87d41e3c36eb1c75172e3183b05a9a34.exe 84 PID 3692 wrote to memory of 4380 3692 87d41e3c36eb1c75172e3183b05a9a34.exe 84 PID 3692 wrote to memory of 4380 3692 87d41e3c36eb1c75172e3183b05a9a34.exe 84 PID 4380 wrote to memory of 720 4380 87d41e3c36eb1c75172e3183b05a9a34.exe 85 PID 4380 wrote to memory of 720 4380 87d41e3c36eb1c75172e3183b05a9a34.exe 85 PID 4380 wrote to memory of 720 4380 87d41e3c36eb1c75172e3183b05a9a34.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\87d41e3c36eb1c75172e3183b05a9a34.exe"C:\Users\Admin\AppData\Local\Temp\87d41e3c36eb1c75172e3183b05a9a34.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\87d41e3c36eb1c75172e3183b05a9a34.exeC:\Users\Admin\AppData\Local\Temp\87d41e3c36eb1c75172e3183b05a9a34.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\87d41e3c36eb1c75172e3183b05a9a34.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5bf3f9650c8b16533b7e4d43efab9b62d
SHA1090d33043e302f2ca50ff4801d669f233813af5a
SHA256357c349472f0d28e85fa0dd8fb2c7a937651acd8ef6940f8f961b5b3979ba7a5
SHA5123fe4b192b06ded69b137a3f5b051937bc3edd3bec0e3818927620ef45714d8e31219bfdf6f539f8a6a9b5633c7352adc75016150c624ca35730f9c9ff5ad2c2f