Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 07:36
Static task
static1
Behavioral task
behavioral1
Sample
79b76d5ac631d08d02c070159b1aeee0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
79b76d5ac631d08d02c070159b1aeee0N.exe
Resource
win10v2004-20240802-en
General
-
Target
79b76d5ac631d08d02c070159b1aeee0N.exe
-
Size
35KB
-
MD5
79b76d5ac631d08d02c070159b1aeee0
-
SHA1
3d69c6f0067bdf92b69ae66e2c8fa379f693c1be
-
SHA256
71a68898c1cf8e39c22b6f0fcbb44bb27b68c6d94ee1b870dcbe4df9558ac29e
-
SHA512
902ef4377e263676edbe7e00abf259ad26dbf4ca155307deb69cc23906be22ec5efb1012c843ca0b815dee2d1907b89d11a7e991632168d545aa67792bf51a22
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/a:e6q10k0EFjed6rqJ+6vghzwYu7vih9GB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2404 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2404 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 79b76d5ac631d08d02c070159b1aeee0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 79b76d5ac631d08d02c070159b1aeee0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79b76d5ac631d08d02c070159b1aeee0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2404 2660 79b76d5ac631d08d02c070159b1aeee0N.exe 30 PID 2660 wrote to memory of 2404 2660 79b76d5ac631d08d02c070159b1aeee0N.exe 30 PID 2660 wrote to memory of 2404 2660 79b76d5ac631d08d02c070159b1aeee0N.exe 30 PID 2660 wrote to memory of 2404 2660 79b76d5ac631d08d02c070159b1aeee0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\79b76d5ac631d08d02c070159b1aeee0N.exe"C:\Users\Admin\AppData\Local\Temp\79b76d5ac631d08d02c070159b1aeee0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD567cf26bdbfc238c8fc5828c1dc0e6ae5
SHA11a66a9cf485b0715c92381ee861453a60d126e64
SHA2566e2d834e4dc7589883f5f25e28d42e04892539a0ffaf2c963a3f43585fefa7de
SHA512a0ffd7b0ede19d36c161fc3f02fafcb3e5d26a1138b0662e05a0a842914499d819fdfb4deaa3f8a9df9ee38d92aba0527b10e0d027d755568797b9a2dfa22281