Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
8c1104648980db470ccd344e8d52d474.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c1104648980db470ccd344e8d52d474.exe
Resource
win10v2004-20231215-en
General
-
Target
8c1104648980db470ccd344e8d52d474.exe
-
Size
1000KB
-
MD5
8c1104648980db470ccd344e8d52d474
-
SHA1
42d94fad13e5f31a525354c03672fb52e2fcf01c
-
SHA256
9e3ff14e6051a32162f1948b96c680383d527b51ab95bee25f1f05eeace9e3b8
-
SHA512
17f4daa04ad487fee3bed58851a7256c05c23748f2c5e2c3d07a943e21496b1d5585f9972f1fdb223f3233820069c427e6817ac1ad1dc316e268fbe2541793ad
-
SSDEEP
24576:wYJOylEo0C6ONW+oSbN1B+5vMiqt0gj2ed:wCbEo0iNW+oSlqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4724 8c1104648980db470ccd344e8d52d474.exe -
Executes dropped EXE 1 IoCs
pid Process 4724 8c1104648980db470ccd344e8d52d474.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 13 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4724 8c1104648980db470ccd344e8d52d474.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4724 8c1104648980db470ccd344e8d52d474.exe 4724 8c1104648980db470ccd344e8d52d474.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3760 8c1104648980db470ccd344e8d52d474.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3760 8c1104648980db470ccd344e8d52d474.exe 4724 8c1104648980db470ccd344e8d52d474.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3760 wrote to memory of 4724 3760 8c1104648980db470ccd344e8d52d474.exe 84 PID 3760 wrote to memory of 4724 3760 8c1104648980db470ccd344e8d52d474.exe 84 PID 3760 wrote to memory of 4724 3760 8c1104648980db470ccd344e8d52d474.exe 84 PID 4724 wrote to memory of 3612 4724 8c1104648980db470ccd344e8d52d474.exe 85 PID 4724 wrote to memory of 3612 4724 8c1104648980db470ccd344e8d52d474.exe 85 PID 4724 wrote to memory of 3612 4724 8c1104648980db470ccd344e8d52d474.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c1104648980db470ccd344e8d52d474.exe"C:\Users\Admin\AppData\Local\Temp\8c1104648980db470ccd344e8d52d474.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\8c1104648980db470ccd344e8d52d474.exeC:\Users\Admin\AppData\Local\Temp\8c1104648980db470ccd344e8d52d474.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8c1104648980db470ccd344e8d52d474.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5e57debc96ce8c950e28fe1c5438db753
SHA1281172bb4fdc4754a16c2a99a8c89f7d18d59eef
SHA256fa801ee80b905f885194e804c43eb53c6c24e2d18745b05a564b62c4869455fb
SHA51207b432810dd17eecfbd1d7d6d9a97ca5e60ba876de9de8010f7f7612dfa4259b29ceaab941c0aea1627b8996a80a093890fbf658a581da6bfbd81c57e42090a9