Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 02:45

General

  • Target

    cdfad24d6f7b956cbf07e6444c3d10f0b91b3e9b912d03d41da6244157fcfbed.exe

  • Size

    42KB

  • MD5

    c76ee33956f33fc21c2708840b8b2e11

  • SHA1

    3b0907765b1ed4309eccc11d3fcc4deba6d924f3

  • SHA256

    cdfad24d6f7b956cbf07e6444c3d10f0b91b3e9b912d03d41da6244157fcfbed

  • SHA512

    b2b3a74f1eb18541b0185b2b1a935b0fdda91f0e0623bab11cb3bad392c2651279bc871b21b7676cd462f5efa07aeed67240415ce2343674a7c3a6ce822e42f5

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhZ:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY5

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdfad24d6f7b956cbf07e6444c3d10f0b91b3e9b912d03d41da6244157fcfbed.exe
    "C:\Users\Admin\AppData\Local\Temp\cdfad24d6f7b956cbf07e6444c3d10f0b91b3e9b912d03d41da6244157fcfbed.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    42KB

    MD5

    e9b9f13dcbb496e8d608fffccf357da8

    SHA1

    7445a0d72710783843dfeddfe7e8b3bd2f3e610d

    SHA256

    16280978eeec39360866aa6fcc6b02f3c60648d1035dcc31ef48072977b23fa1

    SHA512

    64a2224cf967767a1ec44a0f68b3171f82ab938dad1a54bf79d66040306030f2a1707b9bcf44342a4c912760c1ba00dd96561f31fe12039c4066b39d950e77be

  • memory/4488-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4488-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB