Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
a299b7e87b5adc48c7b16f50800a3eba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a299b7e87b5adc48c7b16f50800a3eba.exe
Resource
win10v2004-20240221-en
General
-
Target
a299b7e87b5adc48c7b16f50800a3eba.exe
-
Size
1000KB
-
MD5
a299b7e87b5adc48c7b16f50800a3eba
-
SHA1
3d33b03c23edc081ad37e594294b882ef458d583
-
SHA256
53b3c425c28a3a1bbafbd7e92469aee6959088d36f98c1119e18577bdcce9565
-
SHA512
d374a67f3ee3abb328f18183fbc62c74541cb3b3905e3df4c919d3e4ec916e6592c421290fec11a32835437253af79ea3caf72261eb79668b6c6dae4be2e49ac
-
SSDEEP
12288:0xZAnn7zPtvR8bFB9pAebtv81lZySXQS6R6FECaBwQ2tb5JLrnylUPqt0gHDS7ed:77zFe5B9H9mmS2RV1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1640 a299b7e87b5adc48c7b16f50800a3eba.exe -
Executes dropped EXE 1 IoCs
pid Process 1640 a299b7e87b5adc48c7b16f50800a3eba.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 pastebin.com 13 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1640 a299b7e87b5adc48c7b16f50800a3eba.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1640 a299b7e87b5adc48c7b16f50800a3eba.exe 1640 a299b7e87b5adc48c7b16f50800a3eba.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4296 a299b7e87b5adc48c7b16f50800a3eba.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4296 a299b7e87b5adc48c7b16f50800a3eba.exe 1640 a299b7e87b5adc48c7b16f50800a3eba.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4296 wrote to memory of 1640 4296 a299b7e87b5adc48c7b16f50800a3eba.exe 85 PID 4296 wrote to memory of 1640 4296 a299b7e87b5adc48c7b16f50800a3eba.exe 85 PID 4296 wrote to memory of 1640 4296 a299b7e87b5adc48c7b16f50800a3eba.exe 85 PID 1640 wrote to memory of 4584 1640 a299b7e87b5adc48c7b16f50800a3eba.exe 86 PID 1640 wrote to memory of 4584 1640 a299b7e87b5adc48c7b16f50800a3eba.exe 86 PID 1640 wrote to memory of 4584 1640 a299b7e87b5adc48c7b16f50800a3eba.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a299b7e87b5adc48c7b16f50800a3eba.exe"C:\Users\Admin\AppData\Local\Temp\a299b7e87b5adc48c7b16f50800a3eba.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\a299b7e87b5adc48c7b16f50800a3eba.exeC:\Users\Admin\AppData\Local\Temp\a299b7e87b5adc48c7b16f50800a3eba.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\a299b7e87b5adc48c7b16f50800a3eba.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5cae3d89c1605fe10f453acfe2236307e
SHA15e8e869e2bf061e83426f8ecc3e97a950563e4d7
SHA25696c68f7829302a3a3a1905f6e0f3f62f4ffb549b26873799cb6a4ec8a037d536
SHA512c8eb3a2801b3e99c83c61ecbc472d3c80ea3f1885f0844e732159c325410cd8fe65accdd2bb8d30ba4781e541c283db0f9c9a056425b0c99b0e5675216cdfd48