Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 12:33

General

  • Target

    2de55621717613b4ab1272f2aafb1e1946421b6c3d14ab5fa3f28fb7d974fd55N.exe

  • Size

    95KB

  • MD5

    87557e650aeeaaa430d2e46134f42560

  • SHA1

    0541edd6cf8c33f781a52d67b4c7f2850bbe3bea

  • SHA256

    2de55621717613b4ab1272f2aafb1e1946421b6c3d14ab5fa3f28fb7d974fd55

  • SHA512

    99da324bfb5e9be96a55d7830b0b02265d03b085a9ab2f8aacd5358cf90448c8916c590f71034cc5206537ab11665ffe3a204905db1120b2683f07488c5b4a72

  • SSDEEP

    1536:YAowfUJFgjT284U+w2EwRz6OlvaeEpIaCtwUaSvcmGCCCCCHCChCHCCCdg1WCCC0:YAowyFgjTiUkEwt6OlvaeEpIaCtwUaSf

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2de55621717613b4ab1272f2aafb1e1946421b6c3d14ab5fa3f28fb7d974fd55N.exe
    "C:\Users\Admin\AppData\Local\Temp\2de55621717613b4ab1272f2aafb1e1946421b6c3d14ab5fa3f28fb7d974fd55N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5108
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:3312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    96KB

    MD5

    344f69ceb5d5d62c9c3f0758f8087d0a

    SHA1

    785c93b7440aa216642f463b046c9baa6971dd77

    SHA256

    1e624c620c009b510b4805dd22e5cd6bc7514aca42d56db8534efed8d8d20496

    SHA512

    68aa45d8c91a335c7063e959b262ef3697290295bb767ba75d2369aee75bd2a7e4e2fcbb244573b656211a19ef5d0626fa04b0a87697d57e0c4b43c3a69e4de9

  • memory/3312-6-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/5108-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/5108-5-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB