Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
c577d02da3350013f1dcba4dadef1b40N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c577d02da3350013f1dcba4dadef1b40N.exe
Resource
win10v2004-20240802-en
General
-
Target
c577d02da3350013f1dcba4dadef1b40N.exe
-
Size
63KB
-
MD5
c577d02da3350013f1dcba4dadef1b40
-
SHA1
d9caacf15171dfe780a6b11f3b1c1eeb0fe03e25
-
SHA256
9dd911626b16001f5bd8811f7d572b21e175861f2496c12071439df3a4832049
-
SHA512
f933c3841724ed17b5e6e2527a86647fe408e25f12b3c8c2c4040a935fae17b23e7c6e1913ae89ade5d210a07794c74b7d8ed93fbc0f157dbb4cc0b57eb236c5
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAcBHUIFvSHbhqhYhlvE:NAoglOwvl4ulkP6vghzwYu7vih9GueIG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3740 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3740 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" c577d02da3350013f1dcba4dadef1b40N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe c577d02da3350013f1dcba4dadef1b40N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c577d02da3350013f1dcba4dadef1b40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3740 2424 c577d02da3350013f1dcba4dadef1b40N.exe 83 PID 2424 wrote to memory of 3740 2424 c577d02da3350013f1dcba4dadef1b40N.exe 83 PID 2424 wrote to memory of 3740 2424 c577d02da3350013f1dcba4dadef1b40N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c577d02da3350013f1dcba4dadef1b40N.exe"C:\Users\Admin\AppData\Local\Temp\c577d02da3350013f1dcba4dadef1b40N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5deae3dfd150d17990a8831fc658bf8a4
SHA121a14e1f9e211f974a2713c17f7283754271c7ad
SHA256105003831475eae5ea8d0a29351c266ff1fdec3c0d02a44fcdc293da474f1ef6
SHA5121ef54ddef0bb90feed661b910cc3a88295e71a496e6ebfb0b21304e22c4bb7ddbdc08a115fc540c365976137f0bfb4050c68398f6c4373a29abddfcf9616ceff