Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
61b4c4bae662166a4d1c4115ce88fa20N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61b4c4bae662166a4d1c4115ce88fa20N.exe
Resource
win10v2004-20240802-en
General
-
Target
61b4c4bae662166a4d1c4115ce88fa20N.exe
-
Size
44KB
-
MD5
61b4c4bae662166a4d1c4115ce88fa20
-
SHA1
1e6afd1d895cd03bdb058ee5cee5abc19c5a170c
-
SHA256
216b71b42c7c05fe0c2e46b8153bde7d88439667a18a18289f8f99479048a2ec
-
SHA512
4d95a1d126b4b5aee3fcc0ff04b6c7f520f9a3006fd9350e72e734887646ab5c3b16b7f4cd42e4dffd174461b28a5fb44227feb5459e57ce1b69a9a83582cf40
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhd:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 61b4c4bae662166a4d1c4115ce88fa20N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 61b4c4bae662166a4d1c4115ce88fa20N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61b4c4bae662166a4d1c4115ce88fa20N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2752 2708 61b4c4bae662166a4d1c4115ce88fa20N.exe 31 PID 2708 wrote to memory of 2752 2708 61b4c4bae662166a4d1c4115ce88fa20N.exe 31 PID 2708 wrote to memory of 2752 2708 61b4c4bae662166a4d1c4115ce88fa20N.exe 31 PID 2708 wrote to memory of 2752 2708 61b4c4bae662166a4d1c4115ce88fa20N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\61b4c4bae662166a4d1c4115ce88fa20N.exe"C:\Users\Admin\AppData\Local\Temp\61b4c4bae662166a4d1c4115ce88fa20N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD51107ed1cb15b1573e3f5ef8cc56eedc7
SHA1d12606496be93c2e63e9c0f13bbb6aa53430b444
SHA2567d841d1ab8a55923946c90eb488cb2474a401e3068f372487d7cb9018a76b383
SHA5122503e4f0d7038b585f40a37785268e4e8e398ea4dbeb8a911f463b241ed5c53b280cde249b5551c9b676deaea1e54e6b862862f768d49677c44275ddf1f1ecf4