Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
afa109dfaf272331abd14860751036a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afa109dfaf272331abd14860751036a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
afa109dfaf272331abd14860751036a0N.exe
-
Size
46KB
-
MD5
afa109dfaf272331abd14860751036a0
-
SHA1
daf7d61cdaf32cc26ff40c76a3e7bf2f8ff3e8de
-
SHA256
a123297e5738e577204cb0a8b29ac5363a31fce212e637374350d8071c5635ed
-
SHA512
f7be3dca092a66addd4812b4895b346d2163ea75a100e68aeb82436a0ec2430abfa34308b01004354d31f4dfc1d947c48a54908eb196d6d37d7a022ce9b985ed
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhd:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1784 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1784 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" afa109dfaf272331abd14860751036a0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe afa109dfaf272331abd14860751036a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afa109dfaf272331abd14860751036a0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 1784 2644 afa109dfaf272331abd14860751036a0N.exe 30 PID 2644 wrote to memory of 1784 2644 afa109dfaf272331abd14860751036a0N.exe 30 PID 2644 wrote to memory of 1784 2644 afa109dfaf272331abd14860751036a0N.exe 30 PID 2644 wrote to memory of 1784 2644 afa109dfaf272331abd14860751036a0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\afa109dfaf272331abd14860751036a0N.exe"C:\Users\Admin\AppData\Local\Temp\afa109dfaf272331abd14860751036a0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD507e59dcb4890fb9001c8eb3a5801c0a4
SHA1ceafbba869a86aaf512a928bea02f44f89b17bfd
SHA25616109e8921603102b66651377d7eb68bb8e563fb0a602c77ee8c3ae3db6d4eb8
SHA51281f2cbf97b44b53d0ad6fedaf8b672745680307ea956822c2c051e691ba04ea2104ea935f2bc83741690361f58f78d3ffe12d99f9b53e353c427a7058d507f99