Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
869cf93abd01f6981cf2d473582f94dd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
869cf93abd01f6981cf2d473582f94dd.exe
Resource
win10v2004-20231215-en
General
-
Target
869cf93abd01f6981cf2d473582f94dd.exe
-
Size
506KB
-
MD5
869cf93abd01f6981cf2d473582f94dd
-
SHA1
860bfbf8012f8b76820f0c959ccf7061974243fc
-
SHA256
d7f56aec9688fe21ff3a7daaf03f36f191da44a1a423116d46784c8acec678d6
-
SHA512
204535682211eec81d34e1a93690aa6001548b9e115753be10adcefc2592b14987537f6364afb4385c3aaaad773adf3aa965d65e95bed1dfb5171a6af0a6b7ed
-
SSDEEP
12288:maBXFdf810VjbbqI8vo/RQB/Kbx4lYKdGsO58n8s5rF1:9BrfKs3qnvo/RE/2x4hG7Sn8Qh1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2196 869cf93abd01f6981cf2d473582f94dd.exe -
Executes dropped EXE 1 IoCs
pid Process 2196 869cf93abd01f6981cf2d473582f94dd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 11 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2196 869cf93abd01f6981cf2d473582f94dd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2196 869cf93abd01f6981cf2d473582f94dd.exe 2196 869cf93abd01f6981cf2d473582f94dd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5044 869cf93abd01f6981cf2d473582f94dd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5044 869cf93abd01f6981cf2d473582f94dd.exe 2196 869cf93abd01f6981cf2d473582f94dd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2196 5044 869cf93abd01f6981cf2d473582f94dd.exe 49 PID 5044 wrote to memory of 2196 5044 869cf93abd01f6981cf2d473582f94dd.exe 49 PID 5044 wrote to memory of 2196 5044 869cf93abd01f6981cf2d473582f94dd.exe 49 PID 2196 wrote to memory of 4004 2196 869cf93abd01f6981cf2d473582f94dd.exe 66 PID 2196 wrote to memory of 4004 2196 869cf93abd01f6981cf2d473582f94dd.exe 66 PID 2196 wrote to memory of 4004 2196 869cf93abd01f6981cf2d473582f94dd.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe"C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exeC:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\869cf93abd01f6981cf2d473582f94dd.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5e72055906101780ff845aab149a0fa49
SHA1cd9bba5f8ae27b165a183a36b8b77c043bae8407
SHA2564a979436d33c3a811cdbe967997d6c9ddd89039345697826dc80772db41d1e42
SHA512bb3871a1f889e90a0820e80c85a80803915e3b363cbe96214337297032196c769bb567db4a0ea2122339f22ec5c5facf97ae2313f6a5d7b9d8fe5c4262f0ae83