Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 16:45 UTC
Static task
static1
Behavioral task
behavioral1
Sample
d4033aaf1527a4ce14e754e14bddd9a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4033aaf1527a4ce14e754e14bddd9a2.exe
Resource
win10v2004-20231215-en
General
-
Target
d4033aaf1527a4ce14e754e14bddd9a2.exe
-
Size
1000KB
-
MD5
d4033aaf1527a4ce14e754e14bddd9a2
-
SHA1
00a4a66cdd3d32827c2c70122f1792018d95e48e
-
SHA256
162176dd27cff995ab743814ad56dc74fce12b98f7b5d8cbfd4949544d847c00
-
SHA512
7c23b70f1105fad2deb596a4aedac0159e2cfd58279fc7d317f2687b0154fe709b28530223b4daef32cd1ae116f1c3dba64b65d8c0945d088d1aab60f8808107
-
SSDEEP
12288:n2xBN/wChxI5LL/fvvtuYMSXkbaAcF3k6mECaBwQ2tb5JLrnylUPqt0gHDS7eyod:2xH/wexI5LLHyQkM1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1648 d4033aaf1527a4ce14e754e14bddd9a2.exe -
Executes dropped EXE 1 IoCs
pid Process 1648 d4033aaf1527a4ce14e754e14bddd9a2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 pastebin.com 22 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1648 d4033aaf1527a4ce14e754e14bddd9a2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1648 d4033aaf1527a4ce14e754e14bddd9a2.exe 1648 d4033aaf1527a4ce14e754e14bddd9a2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2900 d4033aaf1527a4ce14e754e14bddd9a2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2900 d4033aaf1527a4ce14e754e14bddd9a2.exe 1648 d4033aaf1527a4ce14e754e14bddd9a2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2900 wrote to memory of 1648 2900 d4033aaf1527a4ce14e754e14bddd9a2.exe 85 PID 2900 wrote to memory of 1648 2900 d4033aaf1527a4ce14e754e14bddd9a2.exe 85 PID 2900 wrote to memory of 1648 2900 d4033aaf1527a4ce14e754e14bddd9a2.exe 85 PID 1648 wrote to memory of 668 1648 d4033aaf1527a4ce14e754e14bddd9a2.exe 86 PID 1648 wrote to memory of 668 1648 d4033aaf1527a4ce14e754e14bddd9a2.exe 86 PID 1648 wrote to memory of 668 1648 d4033aaf1527a4ce14e754e14bddd9a2.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4033aaf1527a4ce14e754e14bddd9a2.exe"C:\Users\Admin\AppData\Local\Temp\d4033aaf1527a4ce14e754e14bddd9a2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\d4033aaf1527a4ce14e754e14bddd9a2.exeC:\Users\Admin\AppData\Local\Temp\d4033aaf1527a4ce14e754e14bddd9a2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d4033aaf1527a4ce14e754e14bddd9a2.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:668
-
-
Network
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestwww.0UGRW121Ko.comIN AResponse
-
Remote address:8.8.8.8:53Requestw.google.comIN AResponsew.google.comIN CNAMEwww3.l.google.comwww3.l.google.comIN A142.250.179.206
-
Remote address:8.8.8.8:53Requestw.google.comIN A
-
Remote address:8.8.8.8:53Requestw.google.comIN A
-
Remote address:8.8.8.8:53Request202.178.17.96.in-addr.arpaIN PTRResponse202.178.17.96.in-addr.arpaIN PTRa96-17-178-202deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:142.250.179.206:80RequestGET / HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Accept: */*, ???@, ??????????????
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Host: w.google.com
ResponseHTTP/1.1 404 Not Found
Referrer-Policy: no-referrer
Content-Length: 1561
Date: Mon, 18 Mar 2024 16:45:49 GMT
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request206.179.250.142.in-addr.arpaIN PTRResponse206.179.250.142.in-addr.arpaIN PTRams15s42-in-f141e100net
-
Remote address:8.8.8.8:53Request206.179.250.142.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Requestpastebin.comIN AResponsepastebin.comIN A172.67.34.170pastebin.comIN A104.20.68.143pastebin.comIN A104.20.67.143
-
Remote address:172.67.34.170:80RequestGET /raw/ubFNTPjt HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Accept: */*, ???@, ??????????????
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Host: pastebin.com
ResponseHTTP/1.1 301 Moved Permanently
Transfer-Encoding: chunked
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Mon, 18 Mar 2024 17:45:56 GMT
Location: https://pastebin.com/raw/ubFNTPjt
Server: cloudflare
CF-RAY: 8666b229df837792-LHR
-
Remote address:8.8.8.8:53Request170.34.67.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request170.34.67.172.in-addr.arpaIN PTR
-
Remote address:172.67.34.170:443RequestGET /raw/ubFNTPjt HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Accept: */*, ???@, ??????????????
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Host: pastebin.com
ResponseHTTP/1.1 404 Not Found
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
x-frame-options: DENY
x-frame-options: DENY
x-content-type-options: nosniff
x-content-type-options: nosniff
x-xss-protection: 1;mode=block
x-xss-protection: 1;mode=block
cache-control: public, max-age=1801
CF-Cache-Status: EXPIRED
Server: cloudflare
CF-RAY: 8666b22f3f94dc57-LHR
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.165.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request196.178.17.96.in-addr.arpaIN PTRResponse196.178.17.96.in-addr.arpaIN PTRa96-17-178-196deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request200.178.17.96.in-addr.arpaIN PTRResponse200.178.17.96.in-addr.arpaIN PTRa96-17-178-200deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request10.173.189.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request10.173.189.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request10.173.189.20.in-addr.arpaIN PTR
-
1.1kB 1.9kB 8 5
HTTP Request
GET http://w.google.com/HTTP Response
404 -
914 B 476 B 9 4
HTTP Request
GET http://pastebin.com/raw/ubFNTPjtHTTP Response
301 -
1.3kB 4.9kB 12 10
HTTP Request
GET https://pastebin.com/raw/ubFNTPjtHTTP Response
404 -
46 B 1
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
64 B 137 B 1 1
DNS Request
www.0UGRW121Ko.com
-
174 B 95 B 3 1
DNS Request
w.google.com
DNS Request
w.google.com
DNS Request
w.google.com
DNS Response
142.250.179.206
-
72 B 137 B 1 1
DNS Request
202.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
146 B 144 B 2 1
DNS Request
95.221.229.192.in-addr.arpa
DNS Request
95.221.229.192.in-addr.arpa
-
148 B 113 B 2 1
DNS Request
206.179.250.142.in-addr.arpa
DNS Request
206.179.250.142.in-addr.arpa
-
58 B 106 B 1 1
DNS Request
pastebin.com
DNS Response
172.67.34.170104.20.68.143104.20.67.143
-
144 B 134 B 2 1
DNS Request
170.34.67.172.in-addr.arpa
DNS Request
170.34.67.172.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
26.165.165.52.in-addr.arpa
-
216 B 158 B 3 1
DNS Request
171.39.242.20.in-addr.arpa
DNS Request
171.39.242.20.in-addr.arpa
DNS Request
171.39.242.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
196.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
200.178.17.96.in-addr.arpa
-
216 B 158 B 3 1
DNS Request
10.173.189.20.in-addr.arpa
DNS Request
10.173.189.20.in-addr.arpa
DNS Request
10.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD53ea76daa753d5748f59f8d5eece0961a
SHA14f275433f17ea9525864f283c6c1a4728233e21c
SHA25652a7408949a9cd80b6dab705f9e4ab82527c9631834c56dda814bbd3be17d19a
SHA5126163e8551e13512c9f2fa8a7c7ab8ea72514c7cc1a860a10bca665506ccf94c63a39c653dd14f7dc5dba8118f4c3913c4e43a570266590764bd58af9eea0c5e4