Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
13ebb772a8e911a0f8996df1e39e5800N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
13ebb772a8e911a0f8996df1e39e5800N.exe
Resource
win10v2004-20240802-en
General
-
Target
13ebb772a8e911a0f8996df1e39e5800N.exe
-
Size
40KB
-
MD5
13ebb772a8e911a0f8996df1e39e5800
-
SHA1
297eeae5d90e5a4fb1f0e4534191d46a08c79d2b
-
SHA256
72c48f087bbd745336a908f1408bbebd999e2fdcdb672d8578ea3cbf03a69638
-
SHA512
5c6afd967a6492a717b7de64bffe57ce23eaea5b27f23e303e68c7fef145e673ac07efd94c1eeadb3c096a597229b0678fec60df2cdd1236c3d8a2351f246fc4
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhw:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2856 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2856 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 13ebb772a8e911a0f8996df1e39e5800N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 13ebb772a8e911a0f8996df1e39e5800N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13ebb772a8e911a0f8996df1e39e5800N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2856 2696 13ebb772a8e911a0f8996df1e39e5800N.exe 30 PID 2696 wrote to memory of 2856 2696 13ebb772a8e911a0f8996df1e39e5800N.exe 30 PID 2696 wrote to memory of 2856 2696 13ebb772a8e911a0f8996df1e39e5800N.exe 30 PID 2696 wrote to memory of 2856 2696 13ebb772a8e911a0f8996df1e39e5800N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\13ebb772a8e911a0f8996df1e39e5800N.exe"C:\Users\Admin\AppData\Local\Temp\13ebb772a8e911a0f8996df1e39e5800N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5217b22303cf656c5447f37ea6f626578
SHA1931272b7b30a1abb5247c4a363a46641b35c8e68
SHA256d36cb5336d64710fcaf2cac3fb5ca7f3206b6387c380634d4834afe99ca2109b
SHA512be613354080c904397ace52f41a8c250f761159eb619575fbf49e56d50bac760d788f200e8125c697a194a4ce91d7d52864d4990ae4d75848d7474ed858fe869