Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
0a612fcd87d9254b3cca3a0c136241d0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0a612fcd87d9254b3cca3a0c136241d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
0a612fcd87d9254b3cca3a0c136241d0N.exe
-
Size
43KB
-
MD5
0a612fcd87d9254b3cca3a0c136241d0
-
SHA1
786d0e2f3e0b7d3179a2f44889f86fe2d5014e72
-
SHA256
2fb0d3ea7e4b0b72eda41f578a13679ab355501246f3eba7521d7a45133e50ad
-
SHA512
34ea773e6ba13790f5e313a7b09b4ac7bef28424c1dc66beaafd025df8010af19504039d70b2c8fa2a24e0826d9ac084ce0d83086c69d3e919856252734cb967
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhu:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2592 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2592 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 0a612fcd87d9254b3cca3a0c136241d0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 0a612fcd87d9254b3cca3a0c136241d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0a612fcd87d9254b3cca3a0c136241d0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2592 2104 0a612fcd87d9254b3cca3a0c136241d0N.exe 30 PID 2104 wrote to memory of 2592 2104 0a612fcd87d9254b3cca3a0c136241d0N.exe 30 PID 2104 wrote to memory of 2592 2104 0a612fcd87d9254b3cca3a0c136241d0N.exe 30 PID 2104 wrote to memory of 2592 2104 0a612fcd87d9254b3cca3a0c136241d0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a612fcd87d9254b3cca3a0c136241d0N.exe"C:\Users\Admin\AppData\Local\Temp\0a612fcd87d9254b3cca3a0c136241d0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD59108397c3c490539b149dd0f742f4633
SHA1e81f2905531e8279ced190d7255fc32b71a927b2
SHA256240ab51590a757757f3297f2ef895a3b913521d6a4f258f827ce80030d6c4195
SHA512697523a8563cc032ff40266bb55f0a92bab68f8a12343cca4da583fd7c8f3d2f4d894fdafe9538506c97abc282cce5bff27f0488448ce025968eaf2490214c8a