Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 16:39

General

  • Target

    97d16a97dbccac90bed24b3a17bba72267b0904c4e4076e768c6f932a47cbfe3N.exe

  • Size

    60KB

  • MD5

    29648a3ac1d4aef7acdfa764583df480

  • SHA1

    102e003968dc9c4b45542aa7d3c9dae0469c372d

  • SHA256

    97d16a97dbccac90bed24b3a17bba72267b0904c4e4076e768c6f932a47cbfe3

  • SHA512

    c187df01a96774129101881f32464254b35069312af1416579d08fa40bcaba98247e134420060dc844cea07e7bbe1b70e591564829489675efb80d281af40bac

  • SSDEEP

    1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhI9:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVr

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97d16a97dbccac90bed24b3a17bba72267b0904c4e4076e768c6f932a47cbfe3N.exe
    "C:\Users\Admin\AppData\Local\Temp\97d16a97dbccac90bed24b3a17bba72267b0904c4e4076e768c6f932a47cbfe3N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    60KB

    MD5

    7072d2939774145248ad8bcd8d26ced9

    SHA1

    33ccbf845d2a38557bd083db1552b115827c8faa

    SHA256

    d50619218ab6a2c6191c6d97bdaa151201e415167ca89f50eb6b265055dfcc07

    SHA512

    7fb0b90bc1307720d73c59f5a5ca69aeb5078604cb625de8245d6e85e07fddb8ab79e87205c6d748f1c67dc0d1be348bda7d3b7e075cad20ccad62427afc3f00

  • memory/1076-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1076-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1312-8-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1312-10-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB