Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
b84c1bcdfc54998b268bf88a240ef7b7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b84c1bcdfc54998b268bf88a240ef7b7.exe
Resource
win10v2004-20240226-en
General
-
Target
b84c1bcdfc54998b268bf88a240ef7b7.exe
-
Size
1000KB
-
MD5
b84c1bcdfc54998b268bf88a240ef7b7
-
SHA1
7fb2603c8dc973af6c279b766c563ace934f9650
-
SHA256
11bc700b26b09c06b0d4317e4e8d0c26a5ca16834480c0ecf6a4f164ef7f88c6
-
SHA512
8646244c8987cbc14606cac589edf286216362230b8e1a8bb162477285544b46faea3107a024939e793815a8d78346e34f739d474482314e24aa247e11b581d3
-
SSDEEP
24576:M+sLP/2wz52q+ia/Z0/9OJ31B+5vMiqt0gj2ed:y/tuZ49OHqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4180 b84c1bcdfc54998b268bf88a240ef7b7.exe -
Executes dropped EXE 1 IoCs
pid Process 4180 b84c1bcdfc54998b268bf88a240ef7b7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 18 pastebin.com 24 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4180 b84c1bcdfc54998b268bf88a240ef7b7.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4764 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4180 b84c1bcdfc54998b268bf88a240ef7b7.exe 4180 b84c1bcdfc54998b268bf88a240ef7b7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3324 b84c1bcdfc54998b268bf88a240ef7b7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3324 b84c1bcdfc54998b268bf88a240ef7b7.exe 4180 b84c1bcdfc54998b268bf88a240ef7b7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3324 wrote to memory of 4180 3324 b84c1bcdfc54998b268bf88a240ef7b7.exe 89 PID 3324 wrote to memory of 4180 3324 b84c1bcdfc54998b268bf88a240ef7b7.exe 89 PID 3324 wrote to memory of 4180 3324 b84c1bcdfc54998b268bf88a240ef7b7.exe 89 PID 4180 wrote to memory of 4764 4180 b84c1bcdfc54998b268bf88a240ef7b7.exe 92 PID 4180 wrote to memory of 4764 4180 b84c1bcdfc54998b268bf88a240ef7b7.exe 92 PID 4180 wrote to memory of 4764 4180 b84c1bcdfc54998b268bf88a240ef7b7.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b84c1bcdfc54998b268bf88a240ef7b7.exe"C:\Users\Admin\AppData\Local\Temp\b84c1bcdfc54998b268bf88a240ef7b7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\b84c1bcdfc54998b268bf88a240ef7b7.exeC:\Users\Admin\AppData\Local\Temp\b84c1bcdfc54998b268bf88a240ef7b7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\b84c1bcdfc54998b268bf88a240ef7b7.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD523e9da6500cabe524bc6ceaa15702b43
SHA13ac6b109b85571174cc3c074e3a861e1fa38f8e6
SHA2561cdea40f530ecc2bbb9e9d2109768e1a47fd7afaa388b877d7495e654c443568
SHA5125e2fa87bd32a41dbac1189f273b5732e0e9f0c28c06a8038bd72c6ac1bfb5237fe3b82792794412d1584d98b7f4470b37d4fdad8951f9339980ba3ca40f9a953