Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe
Resource
win10v2004-20240802-en
General
-
Target
c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe
-
Size
78KB
-
MD5
e5437e4b02a33297f0cf4354af066980
-
SHA1
cc1e50150136f6d51dac8b3afd767a5bb33c2ebb
-
SHA256
c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9f
-
SHA512
77b732bf56ebc082f3e8ef974ffdacc6676b5a588b56aa67b58f44224e5507e2499a8a6bcb8edb1125c6de9ce204672b30b5a002e016ff6ba90529e2371629c4
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN43vBKMvWPqH5kYhpvEHchVvhA+v:xAo1lOwvlNlXBvsI7hrhEh9cpDN43vBP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2584 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2584 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2584 2124 c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe 29 PID 2124 wrote to memory of 2584 2124 c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe 29 PID 2124 wrote to memory of 2584 2124 c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe 29 PID 2124 wrote to memory of 2584 2124 c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe"C:\Users\Admin\AppData\Local\Temp\c3b44a4a23b1ac7df84b34dd2873a3ede288f8a64ec28b04daf7cb349e721d9fN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD559e351293de94c9a7102aed04dacca6c
SHA17cbdb12efbc5b60ef511c7f4d3f132cd11eb8291
SHA256388be7055c438879c5e1e56ce49f51284149e6d728b95866fc1d4f309e0ad511
SHA512b49610009a221bea9fa7d427ef4dbb9543629e3e24777344cf3e6c474e2600f668d2cbe88c71d6fcb275f15f40ddb10900cf87a2447b216479effeeea00cf358