Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe
Resource
win10v2004-20240709-en
General
-
Target
b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe
-
Size
43KB
-
MD5
535bf7c06692b073b787286510254e77
-
SHA1
1070918ae960916fa8e847218c132554740a69a6
-
SHA256
b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386
-
SHA512
b8fc21555c8dc6c61e4d916e950488f628c7b201fc382189e7135da09a1f78f55ce742c8c9abdbed2b50d941219f8c434ca388e9bc0b2bdbcff578984de54820
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh4:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2352 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2352 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2352 1732 b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe 30 PID 1732 wrote to memory of 2352 1732 b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe 30 PID 1732 wrote to memory of 2352 1732 b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe 30 PID 1732 wrote to memory of 2352 1732 b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe"C:\Users\Admin\AppData\Local\Temp\b2981674e3ca852f89539b019b423fe706178ca41c78efbc9b813b818fe7d386.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD59105fad07b6a0f46bb623c9254b27429
SHA156cb282e83ed20ee809c6c3f814bf49ba205b3d2
SHA25641d44c0c6ec9436382a14c3eb1baa396008eabfb1f645c6cd49d1d7d6077d36a
SHA512072f07178a22c528e9ffd593fd6d02935403193d536512d99026d349ab0af97d68684fd0c628ed194165fb70140101b68516926eb34c516c47b7bf0a4a46c05a