Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2024, 10:05

General

  • Target

    869cf93abd01f6981cf2d473582f94dd.exe

  • Size

    506KB

  • MD5

    869cf93abd01f6981cf2d473582f94dd

  • SHA1

    860bfbf8012f8b76820f0c959ccf7061974243fc

  • SHA256

    d7f56aec9688fe21ff3a7daaf03f36f191da44a1a423116d46784c8acec678d6

  • SHA512

    204535682211eec81d34e1a93690aa6001548b9e115753be10adcefc2592b14987537f6364afb4385c3aaaad773adf3aa965d65e95bed1dfb5171a6af0a6b7ed

  • SSDEEP

    12288:maBXFdf810VjbbqI8vo/RQB/Kbx4lYKdGsO58n8s5rF1:9BrfKs3qnvo/RE/2x4hG7Sn8Qh1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe
    "C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe
      C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe

    Filesize

    345KB

    MD5

    af0c58786dd4da8515cdc606cd0c6fb9

    SHA1

    20988aa34e72e3cc658df7fe35d265645fa7e452

    SHA256

    83493bd461b0500e36a28f1152a82e00b7b3876d0ba6b8e5819a3c11a7ccda14

    SHA512

    4fd629eb002a6f10ad867d4eef181baf5f417a4316d9ce715503243354adb73a2eb720f0cf887b3aa2054739694cd68a7d54457c7ede59fef47c4bf8808f7062

  • C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe

    Filesize

    193KB

    MD5

    297b8aa6deb06df6faddd641684b4fdd

    SHA1

    993871b2b70231f34c296fb25688ab8ce17a27e3

    SHA256

    db653b3d4dc03798e239df93d7ca02af960859f4a490f2e0ed76fe8151a7ebb9

    SHA512

    bc6f8372782da252ff4fbb543a88e5d2a40b1946dde94fee5d63fc54ef826b0c24fc786696c7a4f16512becc9edbb1e21a71d2de43d162e9d2d3605ec7210e5e

  • C:\Users\Admin\AppData\Local\Temp\Cab18EF.tmp

    Filesize

    55KB

    MD5

    6cbb8c7c52770b01111b8ddf7029fead

    SHA1

    a4d69d09caaaac5df6483d15c89d13534b971470

    SHA256

    c1547cde364151d5b9a11c985e1dd1ad11790e3847a2c6a77a969ff7c5892753

    SHA512

    5beb2cb5b0b9c054b7ba7a44012aac776025a6b68fac5afced0049c859acec0b56f816f1f2a67b4ffd7122df537d220ed95bd9b57ad766f899a1debf0c516b1f

  • C:\Users\Admin\AppData\Local\Temp\Tar1902.tmp

    Filesize

    93KB

    MD5

    a259deebe5f7fe8c9af3117c9c8a2ae1

    SHA1

    71052820fbccc7b1941c2ca08012e6ffc9a25e53

    SHA256

    b42596160cf4efb71fe34ff889c1e1a185b0abd46bee0515488fbf4c8efe8be4

    SHA512

    0738f63baf540d53fc1c63244fad68a359c317e6370fe9d289b7218f5b44e6487631f471fbdd8481c58d05034ad39fd3101e8e312205f6ba2ae5077bfa23d15f

  • \Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe

    Filesize

    357KB

    MD5

    4e78a5cfc887f50d6a94f46b9eebe308

    SHA1

    dc6065e1aa5748b63f53e85f1b80f8b7ed3f0c22

    SHA256

    52608b131f8a6a4226d0fdb0da9a92efd039dbe120c300f4ec6216f03da07f36

    SHA512

    a514cc970c3f9c0d37ede5570bb106ea28761bad8ef38e3403718f374ebc9fca4b8c2fcac32161802795538bb2bc80a68f0d6c177a3bc70cad9d0ee67ca68c6e

  • memory/2028-18-0x0000000001490000-0x0000000001513000-memory.dmp

    Filesize

    524KB

  • memory/2028-21-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2028-28-0x0000000002DC0000-0x0000000002E3E000-memory.dmp

    Filesize

    504KB

  • memory/2028-24-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2028-65-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3016-1-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/3016-14-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/3016-15-0x00000000002E0000-0x0000000000363000-memory.dmp

    Filesize

    524KB

  • memory/3016-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/3016-2-0x00000000001A0000-0x0000000000223000-memory.dmp

    Filesize

    524KB