Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe
Resource
win10v2004-20240508-en
General
-
Target
cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe
-
Size
29KB
-
MD5
971e4bf1ced770946d1b6f06f94904af
-
SHA1
b3eeee48a346714a74910f38d1b6cfc6f4cdcb0a
-
SHA256
cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289
-
SHA512
581d29942edd1cbe0ed3dc03c53a53b47f67292fc2dbe6bc986e17a613403ae5fe0528d4aded96fc9ce308472e89fce37f93a301219148eaa61872aed8f803a2
-
SSDEEP
768:IqPJtGA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhJ:IqmA6C1VqaqhtgVRNToV7TtRu8rM0wYp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3688 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3688 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2536 wrote to memory of 3688 2536 cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe 82 PID 2536 wrote to memory of 3688 2536 cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe 82 PID 2536 wrote to memory of 3688 2536 cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe"C:\Users\Admin\AppData\Local\Temp\cadd3d9623cc073361ae72e22e6e7ee3422673fb458a8acf2d982a1a4adc6289.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:3688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5812e37895fb0caa6ad87157e997efba7
SHA182d935619bb77c307c4b96155f47d3b6ac5a7b38
SHA256d9f1c5bd47e2f51abaa1cc42df66b02543ab2166febf479b425e48552a72e455
SHA512a62fe03a70c342809c4040c70f3918e65adac934cf8cecdec92f4b114ce6a266f7f0b0c59c4b473109f1bc10f91d5933e091afc03579c89671593ad78bb9c6c6