Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
9b807b7ba216b71e50e1fcb46c4a498b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9b807b7ba216b71e50e1fcb46c4a498b.exe
Resource
win10v2004-20231222-en
General
-
Target
9b807b7ba216b71e50e1fcb46c4a498b.exe
-
Size
483KB
-
MD5
9b807b7ba216b71e50e1fcb46c4a498b
-
SHA1
b2980c03e3193b7a2fa17350abaa49b8be7342ca
-
SHA256
0465f37e4524ef497e2b8c242ec626da0018b7c852ffa9ba039d44bcd14fbf6a
-
SHA512
a5f557e1525e766bbc41d7d9b9a4fb5c1d2c66797e426b907b76f95b67079b1530843dfdedf5b6515c6948f9b492fc973fb0cffa577a787c0c4b4d8bab4956a4
-
SSDEEP
12288:T8Zw8BfUDTPulrQ3tN5BLl/wxLPXn/9gmXuXs:wW8BIParQ/5BOLvn/9gYuXs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1372 9b807b7ba216b71e50e1fcb46c4a498b.exe -
Executes dropped EXE 1 IoCs
pid Process 1372 9b807b7ba216b71e50e1fcb46c4a498b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 10 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1372 9b807b7ba216b71e50e1fcb46c4a498b.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2744 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1372 9b807b7ba216b71e50e1fcb46c4a498b.exe 1372 9b807b7ba216b71e50e1fcb46c4a498b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3080 9b807b7ba216b71e50e1fcb46c4a498b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3080 9b807b7ba216b71e50e1fcb46c4a498b.exe 1372 9b807b7ba216b71e50e1fcb46c4a498b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3080 wrote to memory of 1372 3080 9b807b7ba216b71e50e1fcb46c4a498b.exe 84 PID 3080 wrote to memory of 1372 3080 9b807b7ba216b71e50e1fcb46c4a498b.exe 84 PID 3080 wrote to memory of 1372 3080 9b807b7ba216b71e50e1fcb46c4a498b.exe 84 PID 1372 wrote to memory of 2744 1372 9b807b7ba216b71e50e1fcb46c4a498b.exe 85 PID 1372 wrote to memory of 2744 1372 9b807b7ba216b71e50e1fcb46c4a498b.exe 85 PID 1372 wrote to memory of 2744 1372 9b807b7ba216b71e50e1fcb46c4a498b.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b807b7ba216b71e50e1fcb46c4a498b.exe"C:\Users\Admin\AppData\Local\Temp\9b807b7ba216b71e50e1fcb46c4a498b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\9b807b7ba216b71e50e1fcb46c4a498b.exeC:\Users\Admin\AppData\Local\Temp\9b807b7ba216b71e50e1fcb46c4a498b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9b807b7ba216b71e50e1fcb46c4a498b.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD598b39dade341f94844f17cfe4185890b
SHA1f69f2ac61d9b92e6493643055ef59ee391337121
SHA2567517e3ecbe0a621e41676d51f2f5c3ef286781600e7cba57dc4e34b5ee27e76f
SHA512638e32465d1dd33b4e317621ed0236d01b67be9621d3c515621212deb7dbb8e90a86ddc4da97f5631ae1d221ed8ae5c4811335a9886dc0c5983c4e2bc6aa10e8