Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
9786e70c196c9fea094caf4078cd3235.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9786e70c196c9fea094caf4078cd3235.exe
Resource
win10v2004-20231222-en
General
-
Target
9786e70c196c9fea094caf4078cd3235.exe
-
Size
241KB
-
MD5
9786e70c196c9fea094caf4078cd3235
-
SHA1
c584d01b9cb0649b5664e1f6b27ab1a18ab2ad05
-
SHA256
395d8877e1ad9dc89349a67921a3ff6131a9886c0fa653b559e00aac2f8fa871
-
SHA512
14267c80b2b2c86947f52a321ba834268a1f18d7a1514383f4de87300e96940841c85809d2a00050ed056e11df9ae44adc9f962fee3757490ff7622efa5859ef
-
SSDEEP
3072:bZrKkF2VD2c2XdBxFVf2zYT7xrKvhalM2M5JBDW4mKdMBozSSEPjQRdIJf8JYJFS:bZr6NMnFVfrHVMalM2M5J/MB2ajYYGeu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 536 9786e70c196c9fea094caf4078cd3235.exe -
Executes dropped EXE 1 IoCs
pid Process 536 9786e70c196c9fea094caf4078cd3235.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 9 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 536 9786e70c196c9fea094caf4078cd3235.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 536 9786e70c196c9fea094caf4078cd3235.exe 536 9786e70c196c9fea094caf4078cd3235.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1612 9786e70c196c9fea094caf4078cd3235.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1612 9786e70c196c9fea094caf4078cd3235.exe 536 9786e70c196c9fea094caf4078cd3235.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1612 wrote to memory of 536 1612 9786e70c196c9fea094caf4078cd3235.exe 83 PID 1612 wrote to memory of 536 1612 9786e70c196c9fea094caf4078cd3235.exe 83 PID 1612 wrote to memory of 536 1612 9786e70c196c9fea094caf4078cd3235.exe 83 PID 536 wrote to memory of 4896 536 9786e70c196c9fea094caf4078cd3235.exe 84 PID 536 wrote to memory of 4896 536 9786e70c196c9fea094caf4078cd3235.exe 84 PID 536 wrote to memory of 4896 536 9786e70c196c9fea094caf4078cd3235.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exe"C:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exeC:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9786e70c196c9fea094caf4078cd3235.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD59dfedba34a4d631daf9c132c487d5aae
SHA1c14d77e1f49cf7f3c4dfeb2de86f2dd55358b663
SHA2565d3fede7058240d285987fbd09b3e6e24108bbecce3d05a8187261920ddc7d8a
SHA512dc64d4b91c50f3235be40e46e9bdc5bf1db6bbcffce0a2777c0771261bf019bf47391acf7bfefecf27e2570ab0f634ae7bea5ef71b280b9b2873cc8041585438