Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
869cf93abd01f6981cf2d473582f94dd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
869cf93abd01f6981cf2d473582f94dd.exe
Resource
win10v2004-20231215-en
General
-
Target
869cf93abd01f6981cf2d473582f94dd.exe
-
Size
506KB
-
MD5
869cf93abd01f6981cf2d473582f94dd
-
SHA1
860bfbf8012f8b76820f0c959ccf7061974243fc
-
SHA256
d7f56aec9688fe21ff3a7daaf03f36f191da44a1a423116d46784c8acec678d6
-
SHA512
204535682211eec81d34e1a93690aa6001548b9e115753be10adcefc2592b14987537f6364afb4385c3aaaad773adf3aa965d65e95bed1dfb5171a6af0a6b7ed
-
SSDEEP
12288:maBXFdf810VjbbqI8vo/RQB/Kbx4lYKdGsO58n8s5rF1:9BrfKs3qnvo/RE/2x4hG7Sn8Qh1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2028 869cf93abd01f6981cf2d473582f94dd.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 869cf93abd01f6981cf2d473582f94dd.exe -
Loads dropped DLL 1 IoCs
pid Process 3016 869cf93abd01f6981cf2d473582f94dd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2028 869cf93abd01f6981cf2d473582f94dd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2028 869cf93abd01f6981cf2d473582f94dd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3016 869cf93abd01f6981cf2d473582f94dd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3016 869cf93abd01f6981cf2d473582f94dd.exe 2028 869cf93abd01f6981cf2d473582f94dd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2028 3016 869cf93abd01f6981cf2d473582f94dd.exe 28 PID 3016 wrote to memory of 2028 3016 869cf93abd01f6981cf2d473582f94dd.exe 28 PID 3016 wrote to memory of 2028 3016 869cf93abd01f6981cf2d473582f94dd.exe 28 PID 3016 wrote to memory of 2028 3016 869cf93abd01f6981cf2d473582f94dd.exe 28 PID 2028 wrote to memory of 2908 2028 869cf93abd01f6981cf2d473582f94dd.exe 30 PID 2028 wrote to memory of 2908 2028 869cf93abd01f6981cf2d473582f94dd.exe 30 PID 2028 wrote to memory of 2908 2028 869cf93abd01f6981cf2d473582f94dd.exe 30 PID 2028 wrote to memory of 2908 2028 869cf93abd01f6981cf2d473582f94dd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe"C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exeC:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
345KB
MD5af0c58786dd4da8515cdc606cd0c6fb9
SHA120988aa34e72e3cc658df7fe35d265645fa7e452
SHA25683493bd461b0500e36a28f1152a82e00b7b3876d0ba6b8e5819a3c11a7ccda14
SHA5124fd629eb002a6f10ad867d4eef181baf5f417a4316d9ce715503243354adb73a2eb720f0cf887b3aa2054739694cd68a7d54457c7ede59fef47c4bf8808f7062
-
Filesize
193KB
MD5297b8aa6deb06df6faddd641684b4fdd
SHA1993871b2b70231f34c296fb25688ab8ce17a27e3
SHA256db653b3d4dc03798e239df93d7ca02af960859f4a490f2e0ed76fe8151a7ebb9
SHA512bc6f8372782da252ff4fbb543a88e5d2a40b1946dde94fee5d63fc54ef826b0c24fc786696c7a4f16512becc9edbb1e21a71d2de43d162e9d2d3605ec7210e5e
-
Filesize
55KB
MD56cbb8c7c52770b01111b8ddf7029fead
SHA1a4d69d09caaaac5df6483d15c89d13534b971470
SHA256c1547cde364151d5b9a11c985e1dd1ad11790e3847a2c6a77a969ff7c5892753
SHA5125beb2cb5b0b9c054b7ba7a44012aac776025a6b68fac5afced0049c859acec0b56f816f1f2a67b4ffd7122df537d220ed95bd9b57ad766f899a1debf0c516b1f
-
Filesize
93KB
MD5a259deebe5f7fe8c9af3117c9c8a2ae1
SHA171052820fbccc7b1941c2ca08012e6ffc9a25e53
SHA256b42596160cf4efb71fe34ff889c1e1a185b0abd46bee0515488fbf4c8efe8be4
SHA5120738f63baf540d53fc1c63244fad68a359c317e6370fe9d289b7218f5b44e6487631f471fbdd8481c58d05034ad39fd3101e8e312205f6ba2ae5077bfa23d15f
-
Filesize
357KB
MD54e78a5cfc887f50d6a94f46b9eebe308
SHA1dc6065e1aa5748b63f53e85f1b80f8b7ed3f0c22
SHA25652608b131f8a6a4226d0fdb0da9a92efd039dbe120c300f4ec6216f03da07f36
SHA512a514cc970c3f9c0d37ede5570bb106ea28761bad8ef38e3403718f374ebc9fca4b8c2fcac32161802795538bb2bc80a68f0d6c177a3bc70cad9d0ee67ca68c6e