Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
a1cc962beac821e1f951e8b9558da7bf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1cc962beac821e1f951e8b9558da7bf.exe
Resource
win10v2004-20240221-en
General
-
Target
a1cc962beac821e1f951e8b9558da7bf.exe
-
Size
483KB
-
MD5
a1cc962beac821e1f951e8b9558da7bf
-
SHA1
027b841518bb2ec7ce40bbc432ff657f791a89e8
-
SHA256
ee38867e2283c76dfeb0a59786b77f841c42ff7e0efb9c6c83657693593432cd
-
SHA512
5e6517f4bc18a35b81ad6f7ef1c83753248c8e0f0382a07f4bbd7461fe280b408c8430b21cbdc2de4673f4bce26cfacb4e6614a98f386aa09584fc371299474e
-
SSDEEP
12288:7UkgBaQZG47uarUXI6K5liy43PGeEAe4Be:7U2QEawX0riZ+eEOBe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4848 a1cc962beac821e1f951e8b9558da7bf.exe -
Executes dropped EXE 1 IoCs
pid Process 4848 a1cc962beac821e1f951e8b9558da7bf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 14 pastebin.com 18 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4848 a1cc962beac821e1f951e8b9558da7bf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4848 a1cc962beac821e1f951e8b9558da7bf.exe 4848 a1cc962beac821e1f951e8b9558da7bf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4472 a1cc962beac821e1f951e8b9558da7bf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4472 a1cc962beac821e1f951e8b9558da7bf.exe 4848 a1cc962beac821e1f951e8b9558da7bf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4472 wrote to memory of 4848 4472 a1cc962beac821e1f951e8b9558da7bf.exe 87 PID 4472 wrote to memory of 4848 4472 a1cc962beac821e1f951e8b9558da7bf.exe 87 PID 4472 wrote to memory of 4848 4472 a1cc962beac821e1f951e8b9558da7bf.exe 87 PID 4848 wrote to memory of 4024 4848 a1cc962beac821e1f951e8b9558da7bf.exe 90 PID 4848 wrote to memory of 4024 4848 a1cc962beac821e1f951e8b9558da7bf.exe 90 PID 4848 wrote to memory of 4024 4848 a1cc962beac821e1f951e8b9558da7bf.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1cc962beac821e1f951e8b9558da7bf.exe"C:\Users\Admin\AppData\Local\Temp\a1cc962beac821e1f951e8b9558da7bf.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\a1cc962beac821e1f951e8b9558da7bf.exeC:\Users\Admin\AppData\Local\Temp\a1cc962beac821e1f951e8b9558da7bf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\a1cc962beac821e1f951e8b9558da7bf.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
483KB
MD5804e9fb4c0b5d3bfb147b156465c9a1b
SHA13afa8892a5e5bcbb4a67d37d15d177e9bf430281
SHA2560f9e818d60c9e61a68b3595d51bc2197e8b06d2d536d18d5075f783dc04201ed
SHA512ff324fec4c3119ebb7d2de7350b6e6a2c20ee8999240ffb2a94792f00c078ef85fa61d2d75d7af39e6e9b782dc086004cd749deb0cf545ad09b75c7e6138b53e