Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 14:31
Static task
static1
Behavioral task
behavioral1
Sample
e39edf6343902bd22dcf52922b00b3f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e39edf6343902bd22dcf52922b00b3f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
e39edf6343902bd22dcf52922b00b3f0N.exe
-
Size
42KB
-
MD5
e39edf6343902bd22dcf52922b00b3f0
-
SHA1
7da77b4f9769029040845fcb2e4ff4a7bbd13c28
-
SHA256
e6940e444a9422b867767ae2056f7844cdaa82304151b6023c03b3217c26f8b3
-
SHA512
56d05ba8a36ee89f0aa61e1018b74abb98ff7b5f5595ba8188f04f7abeb2996424a4308ce5ec6ad91aed40e737028f4a7ef9b67c98baaba2b09efaa1c5268162
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhN:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2524 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" e39edf6343902bd22dcf52922b00b3f0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe e39edf6343902bd22dcf52922b00b3f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e39edf6343902bd22dcf52922b00b3f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2524 2064 e39edf6343902bd22dcf52922b00b3f0N.exe 29 PID 2064 wrote to memory of 2524 2064 e39edf6343902bd22dcf52922b00b3f0N.exe 29 PID 2064 wrote to memory of 2524 2064 e39edf6343902bd22dcf52922b00b3f0N.exe 29 PID 2064 wrote to memory of 2524 2064 e39edf6343902bd22dcf52922b00b3f0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e39edf6343902bd22dcf52922b00b3f0N.exe"C:\Users\Admin\AppData\Local\Temp\e39edf6343902bd22dcf52922b00b3f0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5b32d189709ced5307c22759a02852131
SHA1f34772afe89188360ac96405d6c5ee05970896f1
SHA256554c5c84ab33a70a792d412739882a4ad464f2005f1b4e819b69d601ce4dc698
SHA5127c00c5e36e85425eaaa19668be0fce255ebd803182db5e23aa52cb78390bbc5340eeafe46486856bc2e14e3dad1a699ad9f692c64cf6d6d1c7ea800a21b9d909