Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 09:22

General

  • Target

    990e0c077b8099e15f5c4a55b2ffa33d.exe

  • Size

    1000KB

  • MD5

    990e0c077b8099e15f5c4a55b2ffa33d

  • SHA1

    9d00725680af3e20c7e42296a0b458de2fde981d

  • SHA256

    d1ed03e3bc52185fd7a11d699e9d29cfc7a54ed337908ab5e93e0bca4df30e49

  • SHA512

    57ef9977381a6a3578a27b178908b3465566bfd5140d43473003c26c92bcbcbce6936c569c9d52347806ab662a1991f4a26803f6f0d4ab41205267b257ec9054

  • SSDEEP

    24576:odw3DzaRxJFKNzvbGqDQUYe30j1B+5vMiqt0gj2ed:JnaPJFG+qEUL30LqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe
    "C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:5680
    • C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe
      C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\990e0c077b8099e15f5c4a55b2ffa33d.exe

    Filesize

    1000KB

    MD5

    58802f8f4cca332d9611645d8786ade1

    SHA1

    c7def43a110c0e4c42a041e367258d327b7fd8ce

    SHA256

    ae7e06a5dbb4a6c712710b11a20551cffa2c5d253290c8ddeb18559067038246

    SHA512

    1e6f30abc0935db22b2a741ef3c9f55481214df245829d0cd58609335f556349eae1ff698c38fb49236290725a189676a5a8535060cd6f375a8374a2cd2f8a52

  • memory/4064-14-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/4064-17-0x0000000001510000-0x0000000001593000-memory.dmp

    Filesize

    524KB

  • memory/4064-20-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4064-21-0x0000000004FA0000-0x000000000501E000-memory.dmp

    Filesize

    504KB

  • memory/4064-27-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/5680-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/5680-1-0x0000000001660000-0x00000000016E3000-memory.dmp

    Filesize

    524KB

  • memory/5680-2-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/5680-11-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB