Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:25
Static task
static1
Behavioral task
behavioral1
Sample
536a86c7e9ff24ee307ed8cd9a62e530N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
536a86c7e9ff24ee307ed8cd9a62e530N.exe
Resource
win10v2004-20240802-en
General
-
Target
536a86c7e9ff24ee307ed8cd9a62e530N.exe
-
Size
43KB
-
MD5
536a86c7e9ff24ee307ed8cd9a62e530
-
SHA1
7d460e6a6c69155fce4cfa99c92c83a00f51e1cb
-
SHA256
86ac099cebeef63cff7f23e18244eaba61fdd7c8b871cc88dd723b1ede9bf034
-
SHA512
75b656b3cf4f6b25f256f7fa52867e5b7efcb353b60f6d058a3632c2a5d2346872ee249c23b66c537979e53feca721599264c0601b015bb86760b15efc918f4c
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhq:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1784 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1784 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 536a86c7e9ff24ee307ed8cd9a62e530N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 536a86c7e9ff24ee307ed8cd9a62e530N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 536a86c7e9ff24ee307ed8cd9a62e530N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 1784 1620 536a86c7e9ff24ee307ed8cd9a62e530N.exe 30 PID 1620 wrote to memory of 1784 1620 536a86c7e9ff24ee307ed8cd9a62e530N.exe 30 PID 1620 wrote to memory of 1784 1620 536a86c7e9ff24ee307ed8cd9a62e530N.exe 30 PID 1620 wrote to memory of 1784 1620 536a86c7e9ff24ee307ed8cd9a62e530N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\536a86c7e9ff24ee307ed8cd9a62e530N.exe"C:\Users\Admin\AppData\Local\Temp\536a86c7e9ff24ee307ed8cd9a62e530N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD58242dbf32692e66bc36d79acb1f75807
SHA1877605924c798e4fc2b176d0daa07d3f3acb6042
SHA256c1adaea7917643ce51f501a81390c41eec1696e45d69bdcae2865d861530e5b9
SHA5121ac9fa8b013ddb5f158ca81b0e5f1711b263deb475f2f6badfd66e21e23bd134b52e5d61cc719b72fa9b1770fa0403d5fad322f0c4b91b1dba087d98b66f7e97