Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe
Resource
win10v2004-20240802-en
General
-
Target
cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe
-
Size
81KB
-
MD5
82fa4a8eca9f0709286dd84631f00f20
-
SHA1
a0309dc3accabbbf2176fd8832b56a5b21580d9f
-
SHA256
cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972a
-
SHA512
c3c5e6eb8ed8c8db16d2e358b08154ceca50c5237d11757f99a5be98a528899ad9165a7f30425fc552c22b459c4f106d06f8d3aca4e2ea3a71f8b68824b829ff
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCIzhUvT6:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 112 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 112 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 112 904 cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe 29 PID 904 wrote to memory of 112 904 cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe 29 PID 904 wrote to memory of 112 904 cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe 29 PID 904 wrote to memory of 112 904 cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe"C:\Users\Admin\AppData\Local\Temp\cb0c3817f989c2893c907d4c6ace8e97930ea2455e65ae167ab7be5c4a38972aN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5a7cdb9ae2661f0599d7c2cd633e97031
SHA13783c966033115fad8968ebf07a3ff51d822007b
SHA256fd129271a659f84ebc9a6be95ce69e74c6300f2d97068ae3682dae2557f48767
SHA512d55a6aba6811cd70d3a5c23cdc89765c6aec6c262ba874d0b32feb3daef6781c5af8cb4ce6d9fc9d6275bb8de6f54226ce59615871b01a68c0fc5534d7fe51a3