Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
4fa52924d68a5eb12fbce230c0806c30N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4fa52924d68a5eb12fbce230c0806c30N.exe
Resource
win10v2004-20240802-en
General
-
Target
4fa52924d68a5eb12fbce230c0806c30N.exe
-
Size
43KB
-
MD5
4fa52924d68a5eb12fbce230c0806c30
-
SHA1
bcfcc257d186388b6ceaaa2c2bec9dff7d837a75
-
SHA256
58582a4076e823896b6cdd21bba1b62463e99d8fba4b2090536b810f9f92b79b
-
SHA512
e9a214fc033a0c2d7db7c0f8af72a3c9f0433a16a05a49ee6a12daf0de66f0fffd4e853d6ae834b9ab784193b8d44e13fc55cd14817a45a398da2797ffa88921
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhR:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1172 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1172 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 4fa52924d68a5eb12fbce230c0806c30N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 4fa52924d68a5eb12fbce230c0806c30N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fa52924d68a5eb12fbce230c0806c30N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1172 1744 4fa52924d68a5eb12fbce230c0806c30N.exe 30 PID 1744 wrote to memory of 1172 1744 4fa52924d68a5eb12fbce230c0806c30N.exe 30 PID 1744 wrote to memory of 1172 1744 4fa52924d68a5eb12fbce230c0806c30N.exe 30 PID 1744 wrote to memory of 1172 1744 4fa52924d68a5eb12fbce230c0806c30N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fa52924d68a5eb12fbce230c0806c30N.exe"C:\Users\Admin\AppData\Local\Temp\4fa52924d68a5eb12fbce230c0806c30N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5c318097316305d0a1b9bd5e879834cd4
SHA1e9f4c054e7b0d36ba190f215fa3e1424fa185e2e
SHA25616eb460888092075b60a520bab07f56b285217cc42e06fb7112222d6b8b1709c
SHA512c6a92b07bafefbdcfb56c9ccb0cd7e2644410894e6b37acd201178a07d076b73e7a422074f21d31255991ffc38df09faf9cfa2ca493c6ff62d98d85d216090c6