Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
12f99b764e714f1195e08c6b4ac82180N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12f99b764e714f1195e08c6b4ac82180N.exe
Resource
win10v2004-20240802-en
General
-
Target
12f99b764e714f1195e08c6b4ac82180N.exe
-
Size
50KB
-
MD5
12f99b764e714f1195e08c6b4ac82180
-
SHA1
4625d07884ce3e74cdde6d3290b501aed9892d81
-
SHA256
1e2814815adfcf81f8542db21bc0ea6f5b2efd97457b8ca2a442a24c2b14d78f
-
SHA512
a070b52da5f6ee36efe21c91c1c2247a733046a54b8aa0cef25275638e04f6878d0a0413aa4ed63e1ce6b237ce5e9d1d2e497d885bae96d474822f807ab98d53
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIE:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 12f99b764e714f1195e08c6b4ac82180N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 12f99b764e714f1195e08c6b4ac82180N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12f99b764e714f1195e08c6b4ac82180N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2240 2168 12f99b764e714f1195e08c6b4ac82180N.exe 30 PID 2168 wrote to memory of 2240 2168 12f99b764e714f1195e08c6b4ac82180N.exe 30 PID 2168 wrote to memory of 2240 2168 12f99b764e714f1195e08c6b4ac82180N.exe 30 PID 2168 wrote to memory of 2240 2168 12f99b764e714f1195e08c6b4ac82180N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\12f99b764e714f1195e08c6b4ac82180N.exe"C:\Users\Admin\AppData\Local\Temp\12f99b764e714f1195e08c6b4ac82180N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD56eb9e4f5eef09d02e1c1a240fc6bcda4
SHA1e10f039a1766c71f29c98fe26a029675f92992d7
SHA25683cfeece5caf331f95c071c95bc131eb13dd0cc4716bcc27361b506e57ce56e9
SHA5129af1bcef04c02d2b95e9513b40bdbd79a966e0b6909979133d758ffaeb64520825df147bd985847500714da38912414f57769feb7cf5c1490e6cc91645d6855e