Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
1ad2018906e3cdfc527b22be8fe928d0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1ad2018906e3cdfc527b22be8fe928d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
1ad2018906e3cdfc527b22be8fe928d0N.exe
-
Size
42KB
-
MD5
1ad2018906e3cdfc527b22be8fe928d0
-
SHA1
d0b961da862d234ccb95c9f0c5af66dc7de601d1
-
SHA256
3ac81ed1f908d04ccf56568e6c70a63806059f150115bf90b23cbd02e2e6028c
-
SHA512
1ab04e8d1e03451c456cb44911ba725b7f1db836276c35a6efa40739a64ba01e37f684c8488a296014186ebb102b1de95acc3f69ea91f5a8679246134688a71f
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh1:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 220 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 220 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 1ad2018906e3cdfc527b22be8fe928d0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 1ad2018906e3cdfc527b22be8fe928d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ad2018906e3cdfc527b22be8fe928d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1592 wrote to memory of 220 1592 1ad2018906e3cdfc527b22be8fe928d0N.exe 85 PID 1592 wrote to memory of 220 1592 1ad2018906e3cdfc527b22be8fe928d0N.exe 85 PID 1592 wrote to memory of 220 1592 1ad2018906e3cdfc527b22be8fe928d0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ad2018906e3cdfc527b22be8fe928d0N.exe"C:\Users\Admin\AppData\Local\Temp\1ad2018906e3cdfc527b22be8fe928d0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD52ab1d85ff4a9d5434da222ad37085216
SHA1909bc9c8f7c2e672b62f66aa93f41a0b09065646
SHA256d089321b08f583f885c2fa0bfcb7113ee751732865f8d17cbe933151161feff7
SHA512bd3f1c16b6cd278e7bd03868019b25f1cc48fc39804a5b926e8e7111ff3f21f57bf81aebaa3620ec62b76fa393457c6b01a50da4efbc0f7fdca693a6ddae4f82