Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 21:30

General

  • Target

    437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976.exe

  • Size

    9.7MB

  • MD5

    72eb240ffd1678f6b6eb7ec26c81e980

  • SHA1

    a927117831ee2132025616e68ad182cd744d4b39

  • SHA256

    437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976

  • SHA512

    e399f82f9d3f7bfe5663da0df23e140608c5283d98af6a10e3b72205083dbeb155d4e9f44e218603b99f6e55e5f6600eb16f037c4108414dc26805041f102d31

  • SSDEEP

    196608:rbqnhgJuP3LAhCiVXOWvd6A1oMuWr45hrr2u:wS+LJYeJWGhrr2u

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 14 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976.exe
    "C:\Users\Admin\AppData\Local\Temp\437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2976
    • \??\c:\program files (x86)\common files\microsoft shared\help\1049\helpmicrosoft.exe
      "c:\program files (x86)\common files\microsoft shared\help\1049\helpmicrosoft.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:3028
    • \??\c:\program files (x86)\windows nt\accessories\de-de\microsoftbetriebssystem.exe
      "c:\program files (x86)\windows nt\accessories\de-de\microsoftbetriebssystem.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1780
    • \??\c:\program files (x86)\common files\microsoft shared\portal\1033\portalconnectoffice.exe
      "c:\program files (x86)\common files\microsoft shared\portal\1033\portalconnectoffice.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2064
    • \??\c:\program files (x86)\common files\microsoft shared\msinfo\es-es\sistemamsinfo.exe
      "c:\program files (x86)\common files\microsoft shared\msinfo\es-es\sistemamsinfo.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\HelpMicrosoft.exe

    Filesize

    9.7MB

    MD5

    72eb240ffd1678f6b6eb7ec26c81e980

    SHA1

    a927117831ee2132025616e68ad182cd744d4b39

    SHA256

    437f64a5f0130273bbf72301e20b29ae2fc645f08e62860935d6860cd3fa1976

    SHA512

    e399f82f9d3f7bfe5663da0df23e140608c5283d98af6a10e3b72205083dbeb155d4e9f44e218603b99f6e55e5f6600eb16f037c4108414dc26805041f102d31

  • C:\Program Files (x86)\Common Files\microsoft shared\Portal\1033\RCXD686.tmp

    Filesize

    9.7MB

    MD5

    82257adfb58018f8585b8b3d17b772a7

    SHA1

    0ecbf148d55a62c35959a97ccd32cfdfa74be474

    SHA256

    106551a85efdfcef2eb9dd6686069a6f8dac3f9c3cdacdbec05bb1c951c168cf

    SHA512

    46b7eae446142cf15394af2347268ffd1ca4b4d2ebafc2d2d24f6ae74d2ec41249f822deb9ab92197f21afed6f4ab1ac3123db97adc6e557c5bfc4cfdbf8a0fa