Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
99c8e0020a03e49c208cce601caf599e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99c8e0020a03e49c208cce601caf599e.exe
Resource
win10v2004-20231215-en
General
-
Target
99c8e0020a03e49c208cce601caf599e.exe
-
Size
506KB
-
MD5
99c8e0020a03e49c208cce601caf599e
-
SHA1
a0e6e29fa81510d9598d1a32056eea36ad17e892
-
SHA256
ce481c89c65c5dad216aaedf8ef38b41f93ff08a6ad56d6b0ed6278b5f2d6649
-
SHA512
de9c8c17ec90d5d5e1c2c64a62c4985a704a6db7d2bec12931ceeb7e49684f5bbfbda6f171a0518aa36f7652477fc8ba8ac981e1c4b64d8e86a380057e701b2d
-
SSDEEP
12288:XRjmhXwQ9LN4Gf/Q5oUgWsoZore9RFdw8V6:BiwQ9LyG3kgOZoQw8V6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4180 99c8e0020a03e49c208cce601caf599e.exe -
Executes dropped EXE 1 IoCs
pid Process 4180 99c8e0020a03e49c208cce601caf599e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 pastebin.com 12 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4180 99c8e0020a03e49c208cce601caf599e.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4180 99c8e0020a03e49c208cce601caf599e.exe 4180 99c8e0020a03e49c208cce601caf599e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3008 99c8e0020a03e49c208cce601caf599e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3008 99c8e0020a03e49c208cce601caf599e.exe 4180 99c8e0020a03e49c208cce601caf599e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3008 wrote to memory of 4180 3008 99c8e0020a03e49c208cce601caf599e.exe 83 PID 3008 wrote to memory of 4180 3008 99c8e0020a03e49c208cce601caf599e.exe 83 PID 3008 wrote to memory of 4180 3008 99c8e0020a03e49c208cce601caf599e.exe 83 PID 4180 wrote to memory of 940 4180 99c8e0020a03e49c208cce601caf599e.exe 84 PID 4180 wrote to memory of 940 4180 99c8e0020a03e49c208cce601caf599e.exe 84 PID 4180 wrote to memory of 940 4180 99c8e0020a03e49c208cce601caf599e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\99c8e0020a03e49c208cce601caf599e.exe"C:\Users\Admin\AppData\Local\Temp\99c8e0020a03e49c208cce601caf599e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\99c8e0020a03e49c208cce601caf599e.exeC:\Users\Admin\AppData\Local\Temp\99c8e0020a03e49c208cce601caf599e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\99c8e0020a03e49c208cce601caf599e.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:940
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD553fcd369a9e7140ab862c3fdd107be02
SHA1214e6af902f73d4eebdda8f23344f3b62ad8a299
SHA256559f175dbe38ef9fc28532189965955dfe82511d4cfe6a993140446c2b1082c3
SHA5127e3e5d1f3ba5505bb0a90c7a9d28eae0cfdf4fc124c05090d5bfab554140221ba0215e3b248ffd4d46481774020eb8bc57b161ab4343db89c9ec946d228ae642