Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe
Resource
win10v2004-20240226-en
General
-
Target
3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe
-
Size
21KB
-
MD5
d6ab131a312199730c9fa0595f81160c
-
SHA1
e7b787c4c1eff70656563b3c8c4027c71a8ebdbc
-
SHA256
3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0
-
SHA512
52c3902a70ecdd4e17dfc1e3e2877784e7d047eba5058bfa71924dc131ed120d1404446373b772b61ce13a07326883680387eb1246e8d934c865c53f341304a9
-
SSDEEP
384:KICKqPF/EkecA6C1VqahohtgVRNVdoV7TtRu8rM/dWwYVFl2g5coW58dO0xXHV2l:7qPJtecA6C1VqahohtgVRNToV7TtRu8V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 712 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 712 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4800 wrote to memory of 712 4800 3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe 89 PID 4800 wrote to memory of 712 4800 3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe 89 PID 4800 wrote to memory of 712 4800 3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe"C:\Users\Admin\AppData\Local\Temp\3aae2f27add3a34d77352ff4232b58a3d92f4e8c2a9f21d829959bb2d7ab9ba0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD52fc521f7f79039d34b3f9f9d84ab065c
SHA1463c022df6f3f94e1a54a19d17377e85e7c4065c
SHA2569412986e25c3711c54ecdb740bb65e54714430e8d6908960b8cbf918adbac345
SHA512e3887a0c1ab93e1a9ca6158dae4150afc036cad75d7a4a6befb5ea02b6fcd23166d70b2982a76f589e17c9ac26c24690dbd7f1af6f263d96be71d8f1bb305aef