Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 11:28

General

  • Target

    9e3494c7374253afde5c470190cd72d0N.exe

  • Size

    40KB

  • MD5

    9e3494c7374253afde5c470190cd72d0

  • SHA1

    c1db0a716d34ef279c974fcb911cdc08da6518c1

  • SHA256

    62e586e60e654c73d0ed6f9b3a3ca7f701259e8ef4a49ae4a162580803d2edde

  • SHA512

    c8558e073b85f78ed2c9bd364d3516f1ee9090a746c595dd6bc956051d07b001b19e11e8a37c2754a0d3fef81042141f214d9acad794d5e4c25db9726dbcf4d7

  • SSDEEP

    768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6Io:e6q10k0EFjed6rqJ+6vghzwYu7vih9GE

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e3494c7374253afde5c470190cd72d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9e3494c7374253afde5c470190cd72d0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:4220
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4396,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4356 /prefetch:8
    1⤵
      PID:4104

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\microsofthelp.exe

      Filesize

      40KB

      MD5

      f7079462af4ce55b290c386549044ead

      SHA1

      6ec56dfd4dfd7d0c5d7edab0577b3724c1ceae28

      SHA256

      3a71bca9bd1695ca87f9c01030ef15030890bf4f1c8269cb9bf41dc424136561

      SHA512

      bfa38850f1f59c2ed46fbf9543be90b672b762a467166c9713e56eb663dcc4aed7b0debfeb4f821796cd41c5d4fc03226199635fbe7e461c980f489f3cd16711

    • memory/4036-0-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/4036-6-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/4220-7-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB