Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe
Resource
win10v2004-20241007-en
General
-
Target
5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe
-
Size
34KB
-
MD5
924576ea81f52f009d05a32480154b20
-
SHA1
23b414f27d8cbe3ba2b5e6a9c3c157f16d104988
-
SHA256
5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647f
-
SHA512
9c187505c7444d35a8eb108788a7bbee969fc0454acd168f70dc6d01ad2390ed66a94979c5e742cd1f382a90d10678f64cc86937f319c0befc15383a0f60bee4
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wk7IErqyEOGNFbuSxhLIsv/orINI8hx:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wkS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2312 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 956 wrote to memory of 2312 956 5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe 31 PID 956 wrote to memory of 2312 956 5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe 31 PID 956 wrote to memory of 2312 956 5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe 31 PID 956 wrote to memory of 2312 956 5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe"C:\Users\Admin\AppData\Local\Temp\5679cf695ccdae3c0263476a1c49c738813336eaf688fe761285d89d103b647fN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5e1a4ac3b5ed0467bead1d229dadfd06c
SHA17cc056e4cfb94f91e9fac10632857f3ac82c68c4
SHA25627d2f5cab26f887526e80e834171c000d3477fa5a061969b896d584d20b1e78a
SHA512316c952d1f480d3f72bdda3839729bbd1851a7666f2a672981eb3bc3dc158cd46504f29b38414b1b7f7a0f362f934420eb004e0f9351191843660dd9ba3d5730