Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
35ebf3f11a0c5ba77566041509498040N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35ebf3f11a0c5ba77566041509498040N.exe
Resource
win10v2004-20240802-en
General
-
Target
35ebf3f11a0c5ba77566041509498040N.exe
-
Size
44KB
-
MD5
35ebf3f11a0c5ba77566041509498040
-
SHA1
ae549b7d96afb18fc7eba316147a5c90cc5c484c
-
SHA256
1e84e45e8ef5aaea348bd22fad25267c711abee080dad5b2e16b116a4869d3fe
-
SHA512
b7938b4c640f79a9bbdd87cb59e715fe38f7e2ae3e58b0fb6a694cf44c34882f7f90ee592289c38c5b50f785805186b1726bfc5f0491ef9c34cc87bc4f078927
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhP:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2388 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 35ebf3f11a0c5ba77566041509498040N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 35ebf3f11a0c5ba77566041509498040N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35ebf3f11a0c5ba77566041509498040N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2388 2112 35ebf3f11a0c5ba77566041509498040N.exe 30 PID 2112 wrote to memory of 2388 2112 35ebf3f11a0c5ba77566041509498040N.exe 30 PID 2112 wrote to memory of 2388 2112 35ebf3f11a0c5ba77566041509498040N.exe 30 PID 2112 wrote to memory of 2388 2112 35ebf3f11a0c5ba77566041509498040N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ebf3f11a0c5ba77566041509498040N.exe"C:\Users\Admin\AppData\Local\Temp\35ebf3f11a0c5ba77566041509498040N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD590944780e803e1a717730dc53f898604
SHA1e261761899f18bc978d640ecdb06cb16cdac7cff
SHA256151d5c949f4b05db0f2bf54d7804e7d3f9cd01a96f52bb060f1976b9538066b8
SHA512c75889c5c17cdb8b235f0fedc3b54aa3871966e777812c9ada8fcc4ff4a56c48dcb8b25e1fad994f11b3954f7b7a8d104b07c25ee4c436e47108f03ecaf87c6c