Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/08/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
61b4c4bae662166a4d1c4115ce88fa20N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61b4c4bae662166a4d1c4115ce88fa20N.exe
Resource
win10v2004-20240802-en
General
-
Target
61b4c4bae662166a4d1c4115ce88fa20N.exe
-
Size
44KB
-
MD5
61b4c4bae662166a4d1c4115ce88fa20
-
SHA1
1e6afd1d895cd03bdb058ee5cee5abc19c5a170c
-
SHA256
216b71b42c7c05fe0c2e46b8153bde7d88439667a18a18289f8f99479048a2ec
-
SHA512
4d95a1d126b4b5aee3fcc0ff04b6c7f520f9a3006fd9350e72e734887646ab5c3b16b7f4cd42e4dffd174461b28a5fb44227feb5459e57ce1b69a9a83582cf40
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhd:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4428 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4428 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 61b4c4bae662166a4d1c4115ce88fa20N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 61b4c4bae662166a4d1c4115ce88fa20N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61b4c4bae662166a4d1c4115ce88fa20N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 756 wrote to memory of 4428 756 61b4c4bae662166a4d1c4115ce88fa20N.exe 83 PID 756 wrote to memory of 4428 756 61b4c4bae662166a4d1c4115ce88fa20N.exe 83 PID 756 wrote to memory of 4428 756 61b4c4bae662166a4d1c4115ce88fa20N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\61b4c4bae662166a4d1c4115ce88fa20N.exe"C:\Users\Admin\AppData\Local\Temp\61b4c4bae662166a4d1c4115ce88fa20N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD51107ed1cb15b1573e3f5ef8cc56eedc7
SHA1d12606496be93c2e63e9c0f13bbb6aa53430b444
SHA2567d841d1ab8a55923946c90eb488cb2474a401e3068f372487d7cb9018a76b383
SHA5122503e4f0d7038b585f40a37785268e4e8e398ea4dbeb8a911f463b241ed5c53b280cde249b5551c9b676deaea1e54e6b862862f768d49677c44275ddf1f1ecf4