Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe
Resource
win10v2004-20240910-en
General
-
Target
a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe
-
Size
79KB
-
MD5
c91b163d2a8abdff1a35bc2a6f031129
-
SHA1
8ac5f5b46ffb71f477a8963f3e70b7166b8a8274
-
SHA256
a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e
-
SHA512
9f1a43ff6b366bb9448a7113943a9222d4b56636dd1440459b0996abec48b25b08ef848a71b2c6f75cb5dc259d1bda16fbb179f83460851efa0cc587b884621f
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OInvnHvvxIfhqhcGoI/E:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3552 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3552 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3552 2300 a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe 84 PID 2300 wrote to memory of 3552 2300 a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe 84 PID 2300 wrote to memory of 3552 2300 a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe"C:\Users\Admin\AppData\Local\Temp\a22a7661f978f991baf922a1ac2dbd5cb842ffeddc684ab5e10fb29a479e621e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD50fffc2e2b3db68f9dce1ca47f42ba01b
SHA1e8e08f478f620b9361ba003eb4eaf7b82f2bb7ea
SHA256f5f192c253ddb72905e3142db779b6dcb40300d03a8fb66785e04067e9522648
SHA5120fab8700162e5b338f62a92a20c64c7046e0adbd6a8f0dd3d18f35f335dcb05cf7f12c2cf0955ce20c6ed8df5bfbf8dabbca664ce0fccc8006cb890876e35341