Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
a134df2993c95ba72527f56408721320N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a134df2993c95ba72527f56408721320N.exe
Resource
win10v2004-20240802-en
General
-
Target
a134df2993c95ba72527f56408721320N.exe
-
Size
40KB
-
MD5
a134df2993c95ba72527f56408721320
-
SHA1
809632f41f91798c3970270d561f9a01e253ebde
-
SHA256
f14dd8ea7931269ba900fd3ab5e4050c9fb4665d52cad195972a340696c2d8e5
-
SHA512
60d96cd8caaa5a0f961c45a750264731734c49a7c7bb6888aa55486a845ee39f5e346a45c3674a9c1284d93c2db9ee3a60afe2d2511725c28a573005d2f91fc9
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh8:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1804 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1804 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" a134df2993c95ba72527f56408721320N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe a134df2993c95ba72527f56408721320N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a134df2993c95ba72527f56408721320N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1804 2388 a134df2993c95ba72527f56408721320N.exe 30 PID 2388 wrote to memory of 1804 2388 a134df2993c95ba72527f56408721320N.exe 30 PID 2388 wrote to memory of 1804 2388 a134df2993c95ba72527f56408721320N.exe 30 PID 2388 wrote to memory of 1804 2388 a134df2993c95ba72527f56408721320N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a134df2993c95ba72527f56408721320N.exe"C:\Users\Admin\AppData\Local\Temp\a134df2993c95ba72527f56408721320N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD57962e2a5b8698989d636f64cf0329614
SHA19237895ceda2391aee4033b34103beda7b3b2bee
SHA2562802248267283e30e389ebf1aa6be3900edbb45d556c1b7bc76fa2632b321fed
SHA5126af51282b82b3550a5a9082cdf90df84981a6478dc7b63a4c466db9f0d94ea7b274be4c75e3a1c189636b0ad6e0d76791ee54677ef14b4863b4566c4cc60d91b