Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe
Resource
win10v2004-20241007-en
General
-
Target
976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe
-
Size
55KB
-
MD5
f325ac1f7e9ac30748656ab03d5fd250
-
SHA1
0bd6a083bcd152007bd6a00b9ffd97da09f2bf3b
-
SHA256
976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79d
-
SHA512
d3fe4f79101a8725ec0c16463b2ba40a4e634dc432d94b7d995ecd1ed09df5bcf9e2827c9bac66d50284d850e1e15d5ed87a228005e603b91451c138817bb406
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIS:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYV0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2192 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2192 2236 976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe 30 PID 2236 wrote to memory of 2192 2236 976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe 30 PID 2236 wrote to memory of 2192 2236 976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe 30 PID 2236 wrote to memory of 2192 2236 976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe"C:\Users\Admin\AppData\Local\Temp\976cda6da9c815de3bd0fc02be1996344d215363b86cff071b558f4f1be5f79dN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD502d39b407a54b9dc7d5dfb9a1c10b34a
SHA171fb5f0fd5b93a8ddc5d0ed05726b27ec3f2e3d1
SHA256f716df8a91b10051221a78b5ca472d774d886efb82334307f78a3ca22c746f87
SHA512227e8e68c3d2b853499e4eab7646019c068f077f730db2a2de74535f432370d5c031993c7450900e623b5a518d8e26f3bbbf75d306f54fed705b4dfadd3bbcce