Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
bfef5ef9140d683f8ee637ae63fd3174.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfef5ef9140d683f8ee637ae63fd3174.exe
Resource
win10v2004-20240226-en
General
-
Target
bfef5ef9140d683f8ee637ae63fd3174.exe
-
Size
506KB
-
MD5
bfef5ef9140d683f8ee637ae63fd3174
-
SHA1
311b60901c6859ef4f5a1d729c8fac36ac0ea7b0
-
SHA256
49e1485339570f92d928eddcff9a461fc30b1416845e089ee69f5e32b230ef1e
-
SHA512
16d657df84bd0743bb02571025abe1d43245382f6f0f2fc65f3031be0524a11b739b5b05c309e05b4142daeb8a0ed3356e136e25f090faf372366c6f5a063e81
-
SSDEEP
12288:P8LODpfAKmxrnUBQEkvkluOKWNGGH6m8kBelg/qXNYUU0+I+yRUAezzCSQL:PggANxrnulkvkl9/NGMcLH+Il6lCSU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3764 bfef5ef9140d683f8ee637ae63fd3174.exe -
Executes dropped EXE 1 IoCs
pid Process 3764 bfef5ef9140d683f8ee637ae63fd3174.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 18 pastebin.com 23 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3764 bfef5ef9140d683f8ee637ae63fd3174.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3764 bfef5ef9140d683f8ee637ae63fd3174.exe 3764 bfef5ef9140d683f8ee637ae63fd3174.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 216 bfef5ef9140d683f8ee637ae63fd3174.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 216 bfef5ef9140d683f8ee637ae63fd3174.exe 3764 bfef5ef9140d683f8ee637ae63fd3174.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 216 wrote to memory of 3764 216 bfef5ef9140d683f8ee637ae63fd3174.exe 87 PID 216 wrote to memory of 3764 216 bfef5ef9140d683f8ee637ae63fd3174.exe 87 PID 216 wrote to memory of 3764 216 bfef5ef9140d683f8ee637ae63fd3174.exe 87 PID 3764 wrote to memory of 456 3764 bfef5ef9140d683f8ee637ae63fd3174.exe 91 PID 3764 wrote to memory of 456 3764 bfef5ef9140d683f8ee637ae63fd3174.exe 91 PID 3764 wrote to memory of 456 3764 bfef5ef9140d683f8ee637ae63fd3174.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfef5ef9140d683f8ee637ae63fd3174.exe"C:\Users\Admin\AppData\Local\Temp\bfef5ef9140d683f8ee637ae63fd3174.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\bfef5ef9140d683f8ee637ae63fd3174.exeC:\Users\Admin\AppData\Local\Temp\bfef5ef9140d683f8ee637ae63fd3174.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\bfef5ef9140d683f8ee637ae63fd3174.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD568219a62951f78a00e0ba36dcb14dd32
SHA19ae4741a848be8207949e4f3ec4f61abb9b2aa15
SHA256378f370aa0b15e33f809ca7c3bb52767ce543ecc437bd8e9a327e817dabafa29
SHA5120a6bdc1caee73a285f58b8d8ae0413d5598eedee94c44e5c54de212a1e53a3d8da54d6d0e8f974d79f26f61a593b2e3969b203846552921c030d5cf2ff3d9678