Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
ca388e5e222abd7ae00e5cc0b87533a0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ca388e5e222abd7ae00e5cc0b87533a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ca388e5e222abd7ae00e5cc0b87533a0N.exe
-
Size
52KB
-
MD5
ca388e5e222abd7ae00e5cc0b87533a0
-
SHA1
07c227489127a7c023404aca699252e1eedc8e4d
-
SHA256
4d577255d4bb179b88c26f7b324dad13ee332213369287bfec305ccd33f27e18
-
SHA512
dbf6fe6a77d6e001c9069d9ebdb57df084233f413fc0e1b91f175499695437cea500b5abed2771dd43f955d08292f296d954944153a8b2e2f98a55187afca4b9
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIV:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYV/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2200 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2200 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" ca388e5e222abd7ae00e5cc0b87533a0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe ca388e5e222abd7ae00e5cc0b87533a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca388e5e222abd7ae00e5cc0b87533a0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2200 2580 ca388e5e222abd7ae00e5cc0b87533a0N.exe 30 PID 2580 wrote to memory of 2200 2580 ca388e5e222abd7ae00e5cc0b87533a0N.exe 30 PID 2580 wrote to memory of 2200 2580 ca388e5e222abd7ae00e5cc0b87533a0N.exe 30 PID 2580 wrote to memory of 2200 2580 ca388e5e222abd7ae00e5cc0b87533a0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca388e5e222abd7ae00e5cc0b87533a0N.exe"C:\Users\Admin\AppData\Local\Temp\ca388e5e222abd7ae00e5cc0b87533a0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD550a96fa6906ddf12f8321c3952a9dbe5
SHA1b5adac73bcd6a4a1d9b297b5f30e32616808f68c
SHA2569941d90da4da83bea0ca7417f9d0fd5e777089e654b0741ff7704b44f85cb470
SHA512af0b2ae1652e2a31c9d6a84122a177629762aaf57b2869ba3e0736dde1b7c198dbd41ffcb0edcb9e6db4e87f8e548eb6c7ec8a94956b56c574d0890cbfb86b1a