Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
4792e98a14e6989bbab2e0098d08e3c0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4792e98a14e6989bbab2e0098d08e3c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
4792e98a14e6989bbab2e0098d08e3c0N.exe
-
Size
39KB
-
MD5
4792e98a14e6989bbab2e0098d08e3c0
-
SHA1
85ae9b20b99f0fd691b1d17d72460f5f623eee95
-
SHA256
ec1b9472be638c7b4bbfeb67c12cc2575b69ffd632c39a848a538139238a911f
-
SHA512
12d76af052a808cfdcc8f885da9f119dbe9524a8ed5af6290adaa8b22a30f0ab9666f002cf55a6c1c709c62aa67a8f50897fe7578ef7dd28bf68308d5d1d9f81
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh+:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1724 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1724 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 4792e98a14e6989bbab2e0098d08e3c0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 4792e98a14e6989bbab2e0098d08e3c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4792e98a14e6989bbab2e0098d08e3c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1724 1820 4792e98a14e6989bbab2e0098d08e3c0N.exe 30 PID 1820 wrote to memory of 1724 1820 4792e98a14e6989bbab2e0098d08e3c0N.exe 30 PID 1820 wrote to memory of 1724 1820 4792e98a14e6989bbab2e0098d08e3c0N.exe 30 PID 1820 wrote to memory of 1724 1820 4792e98a14e6989bbab2e0098d08e3c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4792e98a14e6989bbab2e0098d08e3c0N.exe"C:\Users\Admin\AppData\Local\Temp\4792e98a14e6989bbab2e0098d08e3c0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD532314317dbe8848039850f6e147f5691
SHA17f4f66b659decb97aa9f5b8307207217f14b721d
SHA256fa44bf9d628b8c048884573a347ab6afcdd84d4c011cfbe08a124f24a2ea4d24
SHA512bbbf5222e8df7d0de64e941fb1b2afa351eeb802778e1b1a9ba47d59f0d0386ce25af31dffa7dd58ac34d9e2ef06630e5d85861f624673f7eb2b896208eeffb4