Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
9786e70c196c9fea094caf4078cd3235.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9786e70c196c9fea094caf4078cd3235.exe
Resource
win10v2004-20231222-en
General
-
Target
9786e70c196c9fea094caf4078cd3235.exe
-
Size
241KB
-
MD5
9786e70c196c9fea094caf4078cd3235
-
SHA1
c584d01b9cb0649b5664e1f6b27ab1a18ab2ad05
-
SHA256
395d8877e1ad9dc89349a67921a3ff6131a9886c0fa653b559e00aac2f8fa871
-
SHA512
14267c80b2b2c86947f52a321ba834268a1f18d7a1514383f4de87300e96940841c85809d2a00050ed056e11df9ae44adc9f962fee3757490ff7622efa5859ef
-
SSDEEP
3072:bZrKkF2VD2c2XdBxFVf2zYT7xrKvhalM2M5JBDW4mKdMBozSSEPjQRdIJf8JYJFS:bZr6NMnFVfrHVMalM2M5J/MB2ajYYGeu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2436 9786e70c196c9fea094caf4078cd3235.exe -
Executes dropped EXE 1 IoCs
pid Process 2436 9786e70c196c9fea094caf4078cd3235.exe -
Loads dropped DLL 1 IoCs
pid Process 1820 9786e70c196c9fea094caf4078cd3235.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 5 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2436 9786e70c196c9fea094caf4078cd3235.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2436 9786e70c196c9fea094caf4078cd3235.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1820 9786e70c196c9fea094caf4078cd3235.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1820 9786e70c196c9fea094caf4078cd3235.exe 2436 9786e70c196c9fea094caf4078cd3235.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2436 1820 9786e70c196c9fea094caf4078cd3235.exe 28 PID 1820 wrote to memory of 2436 1820 9786e70c196c9fea094caf4078cd3235.exe 28 PID 1820 wrote to memory of 2436 1820 9786e70c196c9fea094caf4078cd3235.exe 28 PID 1820 wrote to memory of 2436 1820 9786e70c196c9fea094caf4078cd3235.exe 28 PID 2436 wrote to memory of 2932 2436 9786e70c196c9fea094caf4078cd3235.exe 29 PID 2436 wrote to memory of 2932 2436 9786e70c196c9fea094caf4078cd3235.exe 29 PID 2436 wrote to memory of 2932 2436 9786e70c196c9fea094caf4078cd3235.exe 29 PID 2436 wrote to memory of 2932 2436 9786e70c196c9fea094caf4078cd3235.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exe"C:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exeC:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2932
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD56525fd72db4e963a77c3e38a22be5a39
SHA19c36e36dab8153087582800bdfddec4ea086b95c
SHA25601e9abea3588bda37190bd48b6ab697b87bd2a115c04a305dd3752726f99fab0
SHA512c200be4013648200f0ec2dbffbcf037b6c665f5ebc94162103f0c5353e37b6751ed26ba5cd65674a3f93915a5f5722bf1fd3faa4eecb645af944ec64e3bf43ec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06