Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 15:05
Static task
static1
Behavioral task
behavioral1
Sample
a4474784fd21127e30813f58d83aa790N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a4474784fd21127e30813f58d83aa790N.exe
Resource
win10v2004-20240802-en
General
-
Target
a4474784fd21127e30813f58d83aa790N.exe
-
Size
54KB
-
MD5
a4474784fd21127e30813f58d83aa790
-
SHA1
ffdcc5c989a7c8dc1b508c148fd2c16e70ec9f92
-
SHA256
387be0946ca10e99b9bb4582c1c2860579efcd4e404c47a74781d2cfee4c9176
-
SHA512
ae44a324fc419bde622ed28926a65d3bf4f7a0da47b49dfdd117a63cbb74d8930194a2d8127383f133f11f2f83fb4d76ce899b5dd8d027e9bb18a26ab730e051
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhII:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 824 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 824 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" a4474784fd21127e30813f58d83aa790N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe a4474784fd21127e30813f58d83aa790N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4474784fd21127e30813f58d83aa790N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 824 3040 a4474784fd21127e30813f58d83aa790N.exe 29 PID 3040 wrote to memory of 824 3040 a4474784fd21127e30813f58d83aa790N.exe 29 PID 3040 wrote to memory of 824 3040 a4474784fd21127e30813f58d83aa790N.exe 29 PID 3040 wrote to memory of 824 3040 a4474784fd21127e30813f58d83aa790N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4474784fd21127e30813f58d83aa790N.exe"C:\Users\Admin\AppData\Local\Temp\a4474784fd21127e30813f58d83aa790N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD59250d0e73347d8c614282673ff558abc
SHA10f8768801f105093b56aeb010c12b0103ab939e7
SHA2562190794bd88b2291e6819ec69402ff900e85202ae341df72a3774b79eda4f07a
SHA5125ff8447fa8394d034d3d243fc269415ff22635310e024937b24d7c600ffd85258efc3fe9e3dcf097dd031ff81cf9bd6bf88e1e30ab048a9cd3e17dbfc7683571