Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
989e2858a22e471d98c520e5db5e9feb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
989e2858a22e471d98c520e5db5e9feb.exe
Resource
win10v2004-20231215-en
General
-
Target
989e2858a22e471d98c520e5db5e9feb.exe
-
Size
1000KB
-
MD5
989e2858a22e471d98c520e5db5e9feb
-
SHA1
0bafa36addf965377fc96517bd85e2855da6a490
-
SHA256
56e633ded12bec1ff1a07fd6cf3343bd8af427411f7ca8d216e5d9adca214c38
-
SHA512
0595cecdb9caf4d704207e2ae42ee3d0b327697370e245b97c694065c0fca665aeb2dec0083c5c16dc7af450b6d6fd84e3a1ec4611adf1aa227b1a2f24fb5fa7
-
SSDEEP
24576:+n+WTLGHSkw68v+SQ0K3PTfk4a1B+5vMiqt0gj2ed:+n+WTqHSkw68v+SZKrczqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 952 989e2858a22e471d98c520e5db5e9feb.exe -
Executes dropped EXE 1 IoCs
pid Process 952 989e2858a22e471d98c520e5db5e9feb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 pastebin.com 12 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 952 989e2858a22e471d98c520e5db5e9feb.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2476 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 952 989e2858a22e471d98c520e5db5e9feb.exe 952 989e2858a22e471d98c520e5db5e9feb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 540 989e2858a22e471d98c520e5db5e9feb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 540 989e2858a22e471d98c520e5db5e9feb.exe 952 989e2858a22e471d98c520e5db5e9feb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 540 wrote to memory of 952 540 989e2858a22e471d98c520e5db5e9feb.exe 83 PID 540 wrote to memory of 952 540 989e2858a22e471d98c520e5db5e9feb.exe 83 PID 540 wrote to memory of 952 540 989e2858a22e471d98c520e5db5e9feb.exe 83 PID 952 wrote to memory of 2476 952 989e2858a22e471d98c520e5db5e9feb.exe 84 PID 952 wrote to memory of 2476 952 989e2858a22e471d98c520e5db5e9feb.exe 84 PID 952 wrote to memory of 2476 952 989e2858a22e471d98c520e5db5e9feb.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\989e2858a22e471d98c520e5db5e9feb.exe"C:\Users\Admin\AppData\Local\Temp\989e2858a22e471d98c520e5db5e9feb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\989e2858a22e471d98c520e5db5e9feb.exeC:\Users\Admin\AppData\Local\Temp\989e2858a22e471d98c520e5db5e9feb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\989e2858a22e471d98c520e5db5e9feb.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD547132a05fd278d17a1d7c5a5699246c6
SHA1b65cfed33be3b4d7c27b8d55aa5ee3955b6e2daa
SHA2568f09a322ab7ef828b3bc7cae76e8e08e949d2d30d6b3ea34526ddf956df55e7d
SHA512e4cdf1c7228e63d42c501c677d8df0a9bf000462145c51f472c6b1a9fb3f0f91c02265b922a9696fc4df0768962627bebed62dda0cc7788df36a695471f0c7be