Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
b9042cc3e1aab98f8bf7ee0304907820N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9042cc3e1aab98f8bf7ee0304907820N.exe
Resource
win10v2004-20240802-en
General
-
Target
b9042cc3e1aab98f8bf7ee0304907820N.exe
-
Size
42KB
-
MD5
b9042cc3e1aab98f8bf7ee0304907820
-
SHA1
66c18c724688767343e535744459fc786ebe1133
-
SHA256
51c7d89dfa7597487599a10b9681a2a2da04fd4ed9b223ec3e6707bdd7c5b022
-
SHA512
da2db5c877c69d1151f8a3775583ff7e9bab43968ca06a4e0a75e857fc07e276beb9ecdc45993bc94babbfeb26a275ca4153e3fef88cd6b9f37e643e0a1f9c5a
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhP:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" b9042cc3e1aab98f8bf7ee0304907820N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe b9042cc3e1aab98f8bf7ee0304907820N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9042cc3e1aab98f8bf7ee0304907820N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2752 2012 b9042cc3e1aab98f8bf7ee0304907820N.exe 30 PID 2012 wrote to memory of 2752 2012 b9042cc3e1aab98f8bf7ee0304907820N.exe 30 PID 2012 wrote to memory of 2752 2012 b9042cc3e1aab98f8bf7ee0304907820N.exe 30 PID 2012 wrote to memory of 2752 2012 b9042cc3e1aab98f8bf7ee0304907820N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9042cc3e1aab98f8bf7ee0304907820N.exe"C:\Users\Admin\AppData\Local\Temp\b9042cc3e1aab98f8bf7ee0304907820N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5544b35cc93bed769b22e51f8453b454b
SHA147764cb15e922ebbb9126fe7e41cdf70528dd43d
SHA256e1bfd0146b0daea2d347147333f2e7f292641a7d14fdec3f232696137b6939a5
SHA512ff1a462c3cefb331fc038177a3d50cb88fe3558383b674784ab8b6b462ec47c3f03b89f564d16542bf3e2f27ad1c4683c12ca08d1c53266b55794b4deb21dc5c