Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 08:34 UTC

General

  • Target

    8b57ef0eca7de4b5322f021bc00fd844ebb2d215a1e8ca6d0626b7b77f6a140fN.exe

  • Size

    64KB

  • MD5

    54cd96dfdc458da87bdcbb2cd9e45b00

  • SHA1

    2b67658590a018bb5d92f38874ff84da3ec88e19

  • SHA256

    8b57ef0eca7de4b5322f021bc00fd844ebb2d215a1e8ca6d0626b7b77f6a140f

  • SHA512

    ec08e68317447273ebcde3ae6e1a9ffc51a04980adb00d9f2b5e5191b98a93cb76cf53e4393fb4f5bc56dee9cffb203158dd27aba85fef0476f7524e7b5d1fcd

  • SSDEEP

    1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAjU+EmkcU+uZd7ZY82:lAo1lOwvlKlXBP6vghzwYu7vih9GueIz

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b57ef0eca7de4b5322f021bc00fd844ebb2d215a1e8ca6d0626b7b77f6a140fN.exe
    "C:\Users\Admin\AppData\Local\Temp\8b57ef0eca7de4b5322f021bc00fd844ebb2d215a1e8ca6d0626b7b77f6a140fN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    64KB

    MD5

    dcde62fa960b1ec2f1f1f4fbd0d7fb14

    SHA1

    54e58f777a5fed8ea4c36a854625b9b84264d2ad

    SHA256

    14d3cb8d7c1abff3017f8742a9bedebba13d5e676a0db995d2fe1c3891f3673b

    SHA512

    178777135253f0ef66c50903f3ffeefdc3124be5eda443a64c4132c454dc26ea385a84766ad37ba6336bc6c18eead74fade58fec6af12f938ff208695712bb27

  • memory/2080-9-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2192-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2192-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.