Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
ab2cbd0c36989b91c5520b194c0f30c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab2cbd0c36989b91c5520b194c0f30c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ab2cbd0c36989b91c5520b194c0f30c0N.exe
-
Size
52KB
-
MD5
ab2cbd0c36989b91c5520b194c0f30c0
-
SHA1
647ba6ab2850642fce75976752186095363593ee
-
SHA256
c761958043e3ea6655d7a8439579c864605680634a416b3b69dd41ccca69f158
-
SHA512
559e5ce2d7b3276c7169215f5b5224d94dfbe0e4fbfe0f8e355329ba36c787e0c797ac7f81ae1aff78e4fdcd4cd7c8e2ac86d566e6605e7141b0c58f35eee868
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhID:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1720 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" ab2cbd0c36989b91c5520b194c0f30c0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe ab2cbd0c36989b91c5520b194c0f30c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab2cbd0c36989b91c5520b194c0f30c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1720 2520 ab2cbd0c36989b91c5520b194c0f30c0N.exe 30 PID 2520 wrote to memory of 1720 2520 ab2cbd0c36989b91c5520b194c0f30c0N.exe 30 PID 2520 wrote to memory of 1720 2520 ab2cbd0c36989b91c5520b194c0f30c0N.exe 30 PID 2520 wrote to memory of 1720 2520 ab2cbd0c36989b91c5520b194c0f30c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab2cbd0c36989b91c5520b194c0f30c0N.exe"C:\Users\Admin\AppData\Local\Temp\ab2cbd0c36989b91c5520b194c0f30c0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD55b43de7076d1b7d959b0a38028beb226
SHA101c70d922815d8ee2fad3390c1fa4a1d02ab9ebc
SHA256b3874a2b3a0c46f0c6c685e437c9a30b5c5e0014b9156abdf9863a738133daa3
SHA512ba7e346b118a8b6fc84384baaf1c83b0ded1bf3aca329e8617a3d0927b0dc6362874ea1efeb7d519c31a64d394745fc8953b829222683d84d8e1b31b37e73045