Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
c23cc164a5edf0b3403042eb1055f6d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c23cc164a5edf0b3403042eb1055f6d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c23cc164a5edf0b3403042eb1055f6d0N.exe
-
Size
41KB
-
MD5
c23cc164a5edf0b3403042eb1055f6d0
-
SHA1
2313f3c678cc06c5219e9a51981ecd0008909e3d
-
SHA256
14c1b90863a7e2619d17eefb96b0446634afe6f343432485e1842f5fffc0a7f5
-
SHA512
7da1425d62d0c6f665132214b485b46b600392c28aa014dc2518c06c90ada2577cd30af3560a7ed8a3caffb200c6c1f83e8d3529ef34d27abb1a3a5dee9a2c96
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhD:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" c23cc164a5edf0b3403042eb1055f6d0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe c23cc164a5edf0b3403042eb1055f6d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c23cc164a5edf0b3403042eb1055f6d0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2744 2824 c23cc164a5edf0b3403042eb1055f6d0N.exe 30 PID 2824 wrote to memory of 2744 2824 c23cc164a5edf0b3403042eb1055f6d0N.exe 30 PID 2824 wrote to memory of 2744 2824 c23cc164a5edf0b3403042eb1055f6d0N.exe 30 PID 2824 wrote to memory of 2744 2824 c23cc164a5edf0b3403042eb1055f6d0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c23cc164a5edf0b3403042eb1055f6d0N.exe"C:\Users\Admin\AppData\Local\Temp\c23cc164a5edf0b3403042eb1055f6d0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5bf2e4d6bfc984dbb5ceca845395c8f15
SHA159ffe0d5e4a5f1445f77718b907a92efc8ab1fae
SHA2561b087ae62a6d6ef7af935eed7a024de4da0a0520b5b49ff76316ba957b3095f7
SHA5121ee3859bef950d1ec1d0bffbf2f1b6d3ec8045774a108dfdf6d0061d6fbad1b203758b4c8227d9bd4ca85538a200a9f642f5f2b81d6d83759352171587c0e6ac