Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
c1456a4201af72f786f37204a50765cf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c1456a4201af72f786f37204a50765cf.exe
Resource
win10v2004-20240226-en
General
-
Target
c1456a4201af72f786f37204a50765cf.exe
-
Size
506KB
-
MD5
c1456a4201af72f786f37204a50765cf
-
SHA1
84e4019d24da14e3a9ac8fc5edb4d711d6c32c6b
-
SHA256
449ab2be3e637a7dae99277baeaa57a8377efaaad2ce9aa3a2929d2b41e9aee0
-
SHA512
779e4c293b25e1b7d13fc32344621c8ac3cb79e09b8f4e633f63dd3af2543c38b8561ee8e7fe5672ac65f2e1ea7f2b42178d7d31b902d2f7b69c9385111aa46e
-
SSDEEP
12288:8iAMvs0cntOGe5tZFmV5RueUHPxgFfrGIjL+gVm8kWM+KuG:8iAMzcLcZFmVbpAxoD9L+gU8kWMBuG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3412 c1456a4201af72f786f37204a50765cf.exe -
Executes dropped EXE 1 IoCs
pid Process 3412 c1456a4201af72f786f37204a50765cf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 24 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3412 c1456a4201af72f786f37204a50765cf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3412 c1456a4201af72f786f37204a50765cf.exe 3412 c1456a4201af72f786f37204a50765cf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2784 c1456a4201af72f786f37204a50765cf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2784 c1456a4201af72f786f37204a50765cf.exe 3412 c1456a4201af72f786f37204a50765cf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3412 2784 c1456a4201af72f786f37204a50765cf.exe 90 PID 2784 wrote to memory of 3412 2784 c1456a4201af72f786f37204a50765cf.exe 90 PID 2784 wrote to memory of 3412 2784 c1456a4201af72f786f37204a50765cf.exe 90 PID 3412 wrote to memory of 2868 3412 c1456a4201af72f786f37204a50765cf.exe 93 PID 3412 wrote to memory of 2868 3412 c1456a4201af72f786f37204a50765cf.exe 93 PID 3412 wrote to memory of 2868 3412 c1456a4201af72f786f37204a50765cf.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1456a4201af72f786f37204a50765cf.exe"C:\Users\Admin\AppData\Local\Temp\c1456a4201af72f786f37204a50765cf.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\c1456a4201af72f786f37204a50765cf.exeC:\Users\Admin\AppData\Local\Temp\c1456a4201af72f786f37204a50765cf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c1456a4201af72f786f37204a50765cf.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5f6e57289a4fde76886ae22c3b3ff0602
SHA1ae664413ae3ba6617e7eaa024008560875bd7473
SHA256be45cd55159b24809868f904a3eabf91e51cbf279e96b428371258d5b54c0a3d
SHA512b2cb14bc0a3b33b1bc6ad13e8025c06690626565d0d06894ead90041f5bd1cf1281c4e6baa397877223ac3ae6d31140eac45b67440d9de13ca0a65c00a3b9796