Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
c3667fa86eb30567dfd5c7d3b180cee9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c3667fa86eb30567dfd5c7d3b180cee9.exe
Resource
win10v2004-20240226-en
General
-
Target
c3667fa86eb30567dfd5c7d3b180cee9.exe
-
Size
1000KB
-
MD5
c3667fa86eb30567dfd5c7d3b180cee9
-
SHA1
faa4f29753f20f378df2d87a857f1188e9c6f6eb
-
SHA256
888929489070752bc17d03c220613359c3bbab136cc0783573eab6b833c8b7b6
-
SHA512
3a66f824125d285a4cbe406166edc5df50ba504b05ffb24d8033e640e874437170edeaa9fe0db762bb5f92de5d24688131517a2a0c99b3a1c3d605dcfd8b88e7
-
SSDEEP
24576:4ZTk53guBBJZ6yfdVmu8XsTV/1B+5vMiqt0gj2ed:4Z4jXeyV4XCxqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4884 c3667fa86eb30567dfd5c7d3b180cee9.exe -
Executes dropped EXE 1 IoCs
pid Process 4884 c3667fa86eb30567dfd5c7d3b180cee9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 34 pastebin.com 37 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4884 c3667fa86eb30567dfd5c7d3b180cee9.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4884 c3667fa86eb30567dfd5c7d3b180cee9.exe 4884 c3667fa86eb30567dfd5c7d3b180cee9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3452 c3667fa86eb30567dfd5c7d3b180cee9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3452 c3667fa86eb30567dfd5c7d3b180cee9.exe 4884 c3667fa86eb30567dfd5c7d3b180cee9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4884 3452 c3667fa86eb30567dfd5c7d3b180cee9.exe 88 PID 3452 wrote to memory of 4884 3452 c3667fa86eb30567dfd5c7d3b180cee9.exe 88 PID 3452 wrote to memory of 4884 3452 c3667fa86eb30567dfd5c7d3b180cee9.exe 88 PID 4884 wrote to memory of 1084 4884 c3667fa86eb30567dfd5c7d3b180cee9.exe 95 PID 4884 wrote to memory of 1084 4884 c3667fa86eb30567dfd5c7d3b180cee9.exe 95 PID 4884 wrote to memory of 1084 4884 c3667fa86eb30567dfd5c7d3b180cee9.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3667fa86eb30567dfd5c7d3b180cee9.exe"C:\Users\Admin\AppData\Local\Temp\c3667fa86eb30567dfd5c7d3b180cee9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\c3667fa86eb30567dfd5c7d3b180cee9.exeC:\Users\Admin\AppData\Local\Temp\c3667fa86eb30567dfd5c7d3b180cee9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c3667fa86eb30567dfd5c7d3b180cee9.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD51682f584588954b494e0e9444703f635
SHA14c2475c6f9da1fc45b5b182acb74d44b321ded74
SHA256ad0e300e5ddfd405825b46be79d4296dd0192743b0672a82f8c359c02084002b
SHA51277391de8c4a0e8be1bf85fd011019816f14dc04e401c89e207ec51fa0159b15701944839b8367b74acc745c12e73e9fbc1597453b13ba8f4ec4f1d988b702b4a