Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
327f70df955a56d9000fe606247a1f30N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
327f70df955a56d9000fe606247a1f30N.exe
Resource
win10v2004-20240802-en
General
-
Target
327f70df955a56d9000fe606247a1f30N.exe
-
Size
36KB
-
MD5
327f70df955a56d9000fe606247a1f30
-
SHA1
1b123f67c40584292a3b691a9f45895ac116279b
-
SHA256
5950b333aa9e7233f4fd61231766d274e6b9b2b2236ffe94b3721fcb0f7bac86
-
SHA512
62b5acfbc40bdf383b3ea84d52ee530dcf1e8df9e695405a0b8cf6214c96d7c8c0577e6da1ffa5aff1a63b99ccc5a5017e0f07d3ec95af3dcf6d7ee1f1bd3cfa
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/y:e6q10k0EFjed6rqJ+6vghzwYu7vih9G5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2248 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2248 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 327f70df955a56d9000fe606247a1f30N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 327f70df955a56d9000fe606247a1f30N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 327f70df955a56d9000fe606247a1f30N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2248 2160 327f70df955a56d9000fe606247a1f30N.exe 28 PID 2160 wrote to memory of 2248 2160 327f70df955a56d9000fe606247a1f30N.exe 28 PID 2160 wrote to memory of 2248 2160 327f70df955a56d9000fe606247a1f30N.exe 28 PID 2160 wrote to memory of 2248 2160 327f70df955a56d9000fe606247a1f30N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\327f70df955a56d9000fe606247a1f30N.exe"C:\Users\Admin\AppData\Local\Temp\327f70df955a56d9000fe606247a1f30N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD532623939c9e9d578666274c2d1a91317
SHA1c67e0dfaac82091b3493146f1a6877ec06880868
SHA2563f02dbc69c54a2474dfe48530b2a69d4763f512e5a63d92549150b4bf72fe52b
SHA512944f854d1f315166f2a3e0e17601b55aa6d9973fd4748105bf3b54165a80db83bdb4894e98934cc17bca3adc068c811fa679ab746e72e18bc3a9c38138d1bbb7