Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
0e9ccb2ad091046827ee7870c61fe5d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e9ccb2ad091046827ee7870c61fe5d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
0e9ccb2ad091046827ee7870c61fe5d0N.exe
-
Size
41KB
-
MD5
0e9ccb2ad091046827ee7870c61fe5d0
-
SHA1
e88c473b04ed094946564f7f33d6da7c79b942b2
-
SHA256
a830dabea953d44947ed8c6b0a51e8ad1b1d7a8f14a68db95888d33088bc3526
-
SHA512
244a8902fedc1105bd7f28e79dde257b04b61458f93857a11bd60c6891ec50134fc72bbeb52f6cb167e726c667a08ec4b609be1780475777dff2d8b1f11aa57c
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh1:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1780 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1780 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 0e9ccb2ad091046827ee7870c61fe5d0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 0e9ccb2ad091046827ee7870c61fe5d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e9ccb2ad091046827ee7870c61fe5d0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1780 2092 0e9ccb2ad091046827ee7870c61fe5d0N.exe 30 PID 2092 wrote to memory of 1780 2092 0e9ccb2ad091046827ee7870c61fe5d0N.exe 30 PID 2092 wrote to memory of 1780 2092 0e9ccb2ad091046827ee7870c61fe5d0N.exe 30 PID 2092 wrote to memory of 1780 2092 0e9ccb2ad091046827ee7870c61fe5d0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e9ccb2ad091046827ee7870c61fe5d0N.exe"C:\Users\Admin\AppData\Local\Temp\0e9ccb2ad091046827ee7870c61fe5d0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5c932d54bc848fadee38c8d809d2b423f
SHA13c87c408be9cda565c26be12013a6e2083d2cf86
SHA256e44302541aa76bfa98cf3d9cc494f8e2f3ea2338da7a8899ba17e8f55c377efa
SHA512fe5d827f95c70885ac9a6e578b642d4c0da1e52a2853955aefb72232f2a853a0fd39c18cc280ba49a6d0f5f078a3b80ae8db1284ccdde1536e9cb14c2a41a880