Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
19b23a45c94e919648b8a24d9b05a590N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
19b23a45c94e919648b8a24d9b05a590N.exe
Resource
win10v2004-20240709-en
General
-
Target
19b23a45c94e919648b8a24d9b05a590N.exe
-
Size
38KB
-
MD5
19b23a45c94e919648b8a24d9b05a590
-
SHA1
251254472e806576e4d3a8735d3e9fada88aba09
-
SHA256
2f1c170805f4cff1e17c6df366ecb73897f3064733d72dde24e688935c0d6313
-
SHA512
4fa81fa28576a544811925cf474dc17a95b3d4491bba6674b84fa383dacefab32feece39aca3b0db135de691fe16b1af19ea926bf4830f577a9faf3f5f870d95
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhR:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2696 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 19b23a45c94e919648b8a24d9b05a590N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 19b23a45c94e919648b8a24d9b05a590N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19b23a45c94e919648b8a24d9b05a590N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4596 wrote to memory of 2696 4596 19b23a45c94e919648b8a24d9b05a590N.exe 85 PID 4596 wrote to memory of 2696 4596 19b23a45c94e919648b8a24d9b05a590N.exe 85 PID 4596 wrote to memory of 2696 4596 19b23a45c94e919648b8a24d9b05a590N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\19b23a45c94e919648b8a24d9b05a590N.exe"C:\Users\Admin\AppData\Local\Temp\19b23a45c94e919648b8a24d9b05a590N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5bc030b1ce722acb83ccf8b4b71961fb4
SHA18afc56d9f4eca35d39a6a91e892c3cf84109c7c1
SHA2566bcd4e3e708d3483524f121f02d2bc6ce0546176850362cce1a5dd4cab74ce1a
SHA512d87b85fd9c8ba18b2ec4402167d1550fbd3bbba26b95cd0a598d61a9ef3ec79d562f34317b48b3bb5303e92844722764b99e41296118a89f9d1f69ca5de2b493