Analysis
-
max time kernel
119s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
059c42b36424822fb33d3867efa57e10N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
059c42b36424822fb33d3867efa57e10N.exe
Resource
win10v2004-20240730-en
General
-
Target
059c42b36424822fb33d3867efa57e10N.exe
-
Size
47KB
-
MD5
059c42b36424822fb33d3867efa57e10
-
SHA1
278af9fb87135cdf92abb295a8dc623b6d7fa377
-
SHA256
0a19b38f1a48573d1670d87bd5efcf673481078c5e773a7e601baf2d3616bc18
-
SHA512
0893f01d503c3875202259a4fdd4276cafbbe3e8d4a0f2d2cc4253d67185b99cf971e83f53b04f58f2d985a479c8cb1e65c4903cf23c6f01c10e1159218ace9b
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhF:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1820 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1820 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 059c42b36424822fb33d3867efa57e10N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 059c42b36424822fb33d3867efa57e10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 059c42b36424822fb33d3867efa57e10N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 400 wrote to memory of 1820 400 059c42b36424822fb33d3867efa57e10N.exe 29 PID 400 wrote to memory of 1820 400 059c42b36424822fb33d3867efa57e10N.exe 29 PID 400 wrote to memory of 1820 400 059c42b36424822fb33d3867efa57e10N.exe 29 PID 400 wrote to memory of 1820 400 059c42b36424822fb33d3867efa57e10N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\059c42b36424822fb33d3867efa57e10N.exe"C:\Users\Admin\AppData\Local\Temp\059c42b36424822fb33d3867efa57e10N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD504a4ad5c4c3d750b82cbc92303650f9d
SHA1a45b035f8336303aa3051bfa67eae4e2f03f563d
SHA2563680f134cab324cfd1e90c0dc3cb85aedcf477c05f829edc3313577cb23fd639
SHA51290bb6c120bd107dc703a5a7b082d0fb037920589673e08305e2abb2e0a2a4e60d8065db2d3ff2f912bbb3c02e964b230ff70d0aab9ace48b3872fce8ff60a91b