Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
4ebcb0f1397b4446a937c6d0affada60N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4ebcb0f1397b4446a937c6d0affada60N.exe
Resource
win10v2004-20240802-en
General
-
Target
4ebcb0f1397b4446a937c6d0affada60N.exe
-
Size
45KB
-
MD5
4ebcb0f1397b4446a937c6d0affada60
-
SHA1
df9ada513fa84dc99bfafc750559426a4eeefd10
-
SHA256
f37f25cff5da182221574e5d0578ef6ae1510312343273a8774eee5172a671e7
-
SHA512
92cf2b864350c63d23c81ee95c3e82e5f0f5b295ad15ff73a11adc81c205163e1062f457e088b627e01621cb7a223d457fe7d261b8518a7dd2030c0313531388
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhX:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2680 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 4ebcb0f1397b4446a937c6d0affada60N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 4ebcb0f1397b4446a937c6d0affada60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ebcb0f1397b4446a937c6d0affada60N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2680 1544 4ebcb0f1397b4446a937c6d0affada60N.exe 31 PID 1544 wrote to memory of 2680 1544 4ebcb0f1397b4446a937c6d0affada60N.exe 31 PID 1544 wrote to memory of 2680 1544 4ebcb0f1397b4446a937c6d0affada60N.exe 31 PID 1544 wrote to memory of 2680 1544 4ebcb0f1397b4446a937c6d0affada60N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ebcb0f1397b4446a937c6d0affada60N.exe"C:\Users\Admin\AppData\Local\Temp\4ebcb0f1397b4446a937c6d0affada60N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b55e27901556763e03d7c4d5b1c509ea
SHA13a60d71a06737c3544f7c458840ce80f96f252ce
SHA256776d2315372bdf2e238a6c2c15d6957eae2a22a316b4d613dc785afa1012cc70
SHA512296ee010fe0ccf17bd073019767d59bd05363504c5474dca56b5f09b04efddce7fefc66a3c16fdfc16acf59a0c78f134a3068baa8a94211a53f7d6b44abb20a5