Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
b67548d19dd4ce6bfb52a8199efa839e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b67548d19dd4ce6bfb52a8199efa839e.exe
Resource
win10v2004-20240226-en
General
-
Target
b67548d19dd4ce6bfb52a8199efa839e.exe
-
Size
1000KB
-
MD5
b67548d19dd4ce6bfb52a8199efa839e
-
SHA1
2d8bf760987424201c605fa7efa55cc99ceaf72f
-
SHA256
ce3fae98c6650777586f1e2cbfccdb2f47bd5065426f6f1ce5d49dbba80989d2
-
SHA512
91addcc457283095c044c7891cf76fb6f03e98289de9aacb8b7615b1185644d0072ed023c45c47bf5585cb9e7e7e2e4c44431b6fd7b7efea2fc7d7926d59533a
-
SSDEEP
24576:INAUT69IKeDZC5VdoV1B+5vMiqt0gj2ed:InuetgQqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2944 b67548d19dd4ce6bfb52a8199efa839e.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 b67548d19dd4ce6bfb52a8199efa839e.exe -
Loads dropped DLL 1 IoCs
pid Process 1984 b67548d19dd4ce6bfb52a8199efa839e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2944 b67548d19dd4ce6bfb52a8199efa839e.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2944 b67548d19dd4ce6bfb52a8199efa839e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1984 b67548d19dd4ce6bfb52a8199efa839e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1984 b67548d19dd4ce6bfb52a8199efa839e.exe 2944 b67548d19dd4ce6bfb52a8199efa839e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2944 1984 b67548d19dd4ce6bfb52a8199efa839e.exe 28 PID 1984 wrote to memory of 2944 1984 b67548d19dd4ce6bfb52a8199efa839e.exe 28 PID 1984 wrote to memory of 2944 1984 b67548d19dd4ce6bfb52a8199efa839e.exe 28 PID 1984 wrote to memory of 2944 1984 b67548d19dd4ce6bfb52a8199efa839e.exe 28 PID 2944 wrote to memory of 2480 2944 b67548d19dd4ce6bfb52a8199efa839e.exe 29 PID 2944 wrote to memory of 2480 2944 b67548d19dd4ce6bfb52a8199efa839e.exe 29 PID 2944 wrote to memory of 2480 2944 b67548d19dd4ce6bfb52a8199efa839e.exe 29 PID 2944 wrote to memory of 2480 2944 b67548d19dd4ce6bfb52a8199efa839e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b67548d19dd4ce6bfb52a8199efa839e.exe"C:\Users\Admin\AppData\Local\Temp\b67548d19dd4ce6bfb52a8199efa839e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\b67548d19dd4ce6bfb52a8199efa839e.exeC:\Users\Admin\AppData\Local\Temp\b67548d19dd4ce6bfb52a8199efa839e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\b67548d19dd4ce6bfb52a8199efa839e.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
1000KB
MD5bf186e7fd3cb7abe3d9974871a470c8e
SHA19ddab87d9b088332813af55e4e3b53dd7d5ece4b
SHA25673007d07f21c5508e2f238a15ac7171c988066674cf1cbb652d7c7607a3020de
SHA5124e833a2b80f6e1d9d04d2bd9c31178c0973abac75c0a4a9c77d2a57221d1830d07aef08ba649c1de4b1fb1cb5a0272875c3b81d268f3cf2c4ddf6420dfb172ce