Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
990e0c077b8099e15f5c4a55b2ffa33d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
990e0c077b8099e15f5c4a55b2ffa33d.exe
Resource
win10v2004-20231222-en
General
-
Target
990e0c077b8099e15f5c4a55b2ffa33d.exe
-
Size
1000KB
-
MD5
990e0c077b8099e15f5c4a55b2ffa33d
-
SHA1
9d00725680af3e20c7e42296a0b458de2fde981d
-
SHA256
d1ed03e3bc52185fd7a11d699e9d29cfc7a54ed337908ab5e93e0bca4df30e49
-
SHA512
57ef9977381a6a3578a27b178908b3465566bfd5140d43473003c26c92bcbcbce6936c569c9d52347806ab662a1991f4a26803f6f0d4ab41205267b257ec9054
-
SSDEEP
24576:odw3DzaRxJFKNzvbGqDQUYe30j1B+5vMiqt0gj2ed:JnaPJFG+qEUL30LqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4064 990e0c077b8099e15f5c4a55b2ffa33d.exe -
Executes dropped EXE 1 IoCs
pid Process 4064 990e0c077b8099e15f5c4a55b2ffa33d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 12 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4064 990e0c077b8099e15f5c4a55b2ffa33d.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3048 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4064 990e0c077b8099e15f5c4a55b2ffa33d.exe 4064 990e0c077b8099e15f5c4a55b2ffa33d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5680 990e0c077b8099e15f5c4a55b2ffa33d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5680 990e0c077b8099e15f5c4a55b2ffa33d.exe 4064 990e0c077b8099e15f5c4a55b2ffa33d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5680 wrote to memory of 4064 5680 990e0c077b8099e15f5c4a55b2ffa33d.exe 83 PID 5680 wrote to memory of 4064 5680 990e0c077b8099e15f5c4a55b2ffa33d.exe 83 PID 5680 wrote to memory of 4064 5680 990e0c077b8099e15f5c4a55b2ffa33d.exe 83 PID 4064 wrote to memory of 3048 4064 990e0c077b8099e15f5c4a55b2ffa33d.exe 84 PID 4064 wrote to memory of 3048 4064 990e0c077b8099e15f5c4a55b2ffa33d.exe 84 PID 4064 wrote to memory of 3048 4064 990e0c077b8099e15f5c4a55b2ffa33d.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe"C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5680 -
C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exeC:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3048
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD558802f8f4cca332d9611645d8786ade1
SHA1c7def43a110c0e4c42a041e367258d327b7fd8ce
SHA256ae7e06a5dbb4a6c712710b11a20551cffa2c5d253290c8ddeb18559067038246
SHA5121e6f30abc0935db22b2a741ef3c9f55481214df245829d0cd58609335f556349eae1ff698c38fb49236290725a189676a5a8535060cd6f375a8374a2cd2f8a52