Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/03/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
e12e8211fd7aa4ec90c04cd049378394.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e12e8211fd7aa4ec90c04cd049378394.exe
Resource
win10v2004-20240226-en
General
-
Target
e12e8211fd7aa4ec90c04cd049378394.exe
-
Size
506KB
-
MD5
e12e8211fd7aa4ec90c04cd049378394
-
SHA1
055533f5b931266101bdb537b9d77fba0d970f4f
-
SHA256
e69cc790154a4fc4f19d19531fce11b976352488d95119e02a6ead2566b2144e
-
SHA512
0dd785d082f09e4957a2f39f708d4b927b5b8d48dc4a8c0a78353432c3b824438f1665108bd8d52816db9e9fcd23ffbcf3fe6af25ae1fa2e0a68615065c1428f
-
SSDEEP
12288:hCsv136HWZdpfkfdn2mkC7pO+do7/aqptdIJf/kIlR:hCmvdsdps7tHY/D
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2956 e12e8211fd7aa4ec90c04cd049378394.exe -
Executes dropped EXE 1 IoCs
pid Process 2956 e12e8211fd7aa4ec90c04cd049378394.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 e12e8211fd7aa4ec90c04cd049378394.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2956 e12e8211fd7aa4ec90c04cd049378394.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2132 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2956 e12e8211fd7aa4ec90c04cd049378394.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1948 e12e8211fd7aa4ec90c04cd049378394.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1948 e12e8211fd7aa4ec90c04cd049378394.exe 2956 e12e8211fd7aa4ec90c04cd049378394.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2956 1948 e12e8211fd7aa4ec90c04cd049378394.exe 28 PID 1948 wrote to memory of 2956 1948 e12e8211fd7aa4ec90c04cd049378394.exe 28 PID 1948 wrote to memory of 2956 1948 e12e8211fd7aa4ec90c04cd049378394.exe 28 PID 1948 wrote to memory of 2956 1948 e12e8211fd7aa4ec90c04cd049378394.exe 28 PID 2956 wrote to memory of 2132 2956 e12e8211fd7aa4ec90c04cd049378394.exe 29 PID 2956 wrote to memory of 2132 2956 e12e8211fd7aa4ec90c04cd049378394.exe 29 PID 2956 wrote to memory of 2132 2956 e12e8211fd7aa4ec90c04cd049378394.exe 29 PID 2956 wrote to memory of 2132 2956 e12e8211fd7aa4ec90c04cd049378394.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e12e8211fd7aa4ec90c04cd049378394.exe"C:\Users\Admin\AppData\Local\Temp\e12e8211fd7aa4ec90c04cd049378394.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\e12e8211fd7aa4ec90c04cd049378394.exeC:\Users\Admin\AppData\Local\Temp\e12e8211fd7aa4ec90c04cd049378394.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e12e8211fd7aa4ec90c04cd049378394.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
506KB
MD50617fbcb13814176ac02dc4b02abc577
SHA1486ad586a9cc3691adfac3091de621ad02417d6b
SHA256fbaa1a58869fdb640853789f659dbd9eb866c7ce87ab334db712fc4f9a9dfe96
SHA5124f4e742ff027c59a7c24e96c38ba8756c9096d33f6629146ee7729e73513607fa6e49c6d7ea5c71f1bddc163a2ed85f069ffd27f3b84eb11bc6468bff86a8503