Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
88faeb8aa8d4450ceb23837ff564ea6a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
88faeb8aa8d4450ceb23837ff564ea6a.exe
Resource
win10v2004-20231215-en
General
-
Target
88faeb8aa8d4450ceb23837ff564ea6a.exe
-
Size
1000KB
-
MD5
88faeb8aa8d4450ceb23837ff564ea6a
-
SHA1
d3c4a26d1ad9ad595cc80e1c0f7b9769785ea97a
-
SHA256
49fdd474f962cc755416391a50b933ba71abeada4cc5378cabefe25eed793ae0
-
SHA512
73e3fa06d0c131f0edf9e0ad9369ac42143f043eb44d9da53622b3c9ad0402e51e2521244c366f3024d7186844667efa7577251f68a1f90cc856aa47cd3e3227
-
SSDEEP
24576:+wef4bmSf0BvYRj1qn6mO1B+5vMiqt0gj2ed:+wS4bXf0Bv7+qOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3504 88faeb8aa8d4450ceb23837ff564ea6a.exe -
Executes dropped EXE 1 IoCs
pid Process 3504 88faeb8aa8d4450ceb23837ff564ea6a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 14 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3504 88faeb8aa8d4450ceb23837ff564ea6a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3504 88faeb8aa8d4450ceb23837ff564ea6a.exe 3504 88faeb8aa8d4450ceb23837ff564ea6a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1844 88faeb8aa8d4450ceb23837ff564ea6a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1844 88faeb8aa8d4450ceb23837ff564ea6a.exe 3504 88faeb8aa8d4450ceb23837ff564ea6a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1844 wrote to memory of 3504 1844 88faeb8aa8d4450ceb23837ff564ea6a.exe 84 PID 1844 wrote to memory of 3504 1844 88faeb8aa8d4450ceb23837ff564ea6a.exe 84 PID 1844 wrote to memory of 3504 1844 88faeb8aa8d4450ceb23837ff564ea6a.exe 84 PID 3504 wrote to memory of 2768 3504 88faeb8aa8d4450ceb23837ff564ea6a.exe 85 PID 3504 wrote to memory of 2768 3504 88faeb8aa8d4450ceb23837ff564ea6a.exe 85 PID 3504 wrote to memory of 2768 3504 88faeb8aa8d4450ceb23837ff564ea6a.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\88faeb8aa8d4450ceb23837ff564ea6a.exe"C:\Users\Admin\AppData\Local\Temp\88faeb8aa8d4450ceb23837ff564ea6a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\88faeb8aa8d4450ceb23837ff564ea6a.exeC:\Users\Admin\AppData\Local\Temp\88faeb8aa8d4450ceb23837ff564ea6a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\88faeb8aa8d4450ceb23837ff564ea6a.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD53f828fa83b30ad89e5b337f901b964bc
SHA16f4c3c2b5cd069c6bc676347cfa179adcda2213d
SHA256a146ebf5bd281848773f9da15365cd155e8f114316fb412c60b7a7a83e21fa24
SHA5120f7c9c77a9bd6dece250760f1ab52b0e9a084fdb91bc90ebd79efe9bb6b0f3970d3d90283d2439e7f24a20cab03179315a80c2cc0a11bbd66aaa6aaf86f8fca5