Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 21:16

General

  • Target

    4aa9461d02b00552efcdce9bea358a47c2f43cf1a3da487835f3ca9e5743108e.exe

  • Size

    67KB

  • MD5

    c3822413944dc954866b5a74a1216698

  • SHA1

    699933dd68634451c51d1e9801bc2c358beae00a

  • SHA256

    4aa9461d02b00552efcdce9bea358a47c2f43cf1a3da487835f3ca9e5743108e

  • SHA512

    27e3c8a354dd412861bb3223aec95a66239810811ba1711ea03e795a08ca5ef3323e4758482fe7ab0ef51551d350ec0c54bebfc2fe635f5d4bce49584c847004

  • SSDEEP

    1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbRJhHhLhIKN:NAoglOwvl4ulkP6vghzwYu7vih9GueIe

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4aa9461d02b00552efcdce9bea358a47c2f43cf1a3da487835f3ca9e5743108e.exe
    "C:\Users\Admin\AppData\Local\Temp\4aa9461d02b00552efcdce9bea358a47c2f43cf1a3da487835f3ca9e5743108e.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:4444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    67KB

    MD5

    9ff51a3ef03c61acd4c4cd405549ad8a

    SHA1

    db9fb7a54300a4f8533a433277f6442b23b61360

    SHA256

    bf04b04d8ae94fd414d8207604cda81977eb1aaba0d542a633a633ae3f9c22c7

    SHA512

    2e052e0b698fe72e45aa3e632eecb1b55f972e5afc997b9ade10a2b252b5ae4c686f534ee4c7e11119a3a926747826cba15a5d6a6daf3b3089fb8c97aa951931

  • memory/212-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/212-4-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4444-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB