Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe
Resource
win10v2004-20240802-en
General
-
Target
bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe
-
Size
58KB
-
MD5
11070ad9b9fdd310891d3bd489d24623
-
SHA1
872fc92854036b78b5bc9af88f5b1e2e2adab4e0
-
SHA256
bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778
-
SHA512
efb86100805631ca9971c631bd9bcadd7896c47752845e6a9ae282de35c63e3cb50dd463d16eb26426e3460a611ef809c792bcacd656421d8eb50ee0221c1f21
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIM:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2692 1884 bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe 30 PID 1884 wrote to memory of 2692 1884 bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe 30 PID 1884 wrote to memory of 2692 1884 bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe 30 PID 1884 wrote to memory of 2692 1884 bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe"C:\Users\Admin\AppData\Local\Temp\bd671f01e9259cca3400d06c06fd6ac808e677d510f8ee5ed2e3060e54b79778.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5dd811e34f656e485cf27a94bad2cf063
SHA16ff3bbf56c37967cc5f5018893e3f6d640192240
SHA256acd199a33a7e4b856d4d4735eec1685582f2f751595ddbcbe389708d2173bf2e
SHA512b9bc67cda19bb9161dfdf896a62db66b6bdd43943909466ac0b7e8467b14e5d339f55a3b87282e621da8db2c7e76657417bef086f97ae0a05c3d2845562cf8ee