Overview
overview
8Static
static
3DeltaExecutor.zip
windows7-x64
1DeltaExecutor.zip
windows10-2004-x64
1DeltaExecutor.exe
windows7-x64
8DeltaExecutor.exe
windows10-2004-x64
8System.Col...ns.dll
windows7-x64
1System.Col...ns.dll
windows10-2004-x64
1System.Com...es.dll
windows7-x64
1System.Com...es.dll
windows10-2004-x64
1System.Console.dll
windows7-x64
1System.Console.dll
windows10-2004-x64
1System.Dia...ss.dll
windows7-x64
1System.Dia...ss.dll
windows10-2004-x64
1System.Linq.dll
windows7-x64
1System.Linq.dll
windows10-2004-x64
1System.Memory.dll
windows7-x64
1System.Memory.dll
windows10-2004-x64
1System.Pri...ib.dll
windows7-x64
1System.Pri...ib.dll
windows10-2004-x64
1System.Run...es.dll
windows7-x64
1System.Run...es.dll
windows10-2004-x64
1System.Runtime.dll
windows7-x64
1System.Runtime.dll
windows10-2004-x64
1System.Tex...ns.dll
windows7-x64
1System.Tex...ns.dll
windows10-2004-x64
1System.Thr...ad.dll
windows7-x64
1System.Thr...ad.dll
windows10-2004-x64
1System.Threading.dll
windows7-x64
1System.Threading.dll
windows10-2004-x64
1WinUpdateH...s.json
windows7-x64
3WinUpdateH...s.json
windows10-2004-x64
3WinUpdateHelper.exe
windows7-x64
1WinUpdateHelper.exe
windows10-2004-x64
1Resubmissions
01-01-2025 20:08
250101-yw3eystrcl 801-01-2025 20:04
250101-ytbt8a1qe1 801-01-2025 20:01
250101-yrhvra1pgx 801-01-2025 14:10
250101-rgpf8axnaw 10Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 20:01
Static task
static1
Behavioral task
behavioral1
Sample
DeltaExecutor.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
DeltaExecutor.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DeltaExecutor.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
DeltaExecutor.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
System.Collections.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
System.Collections.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
System.ComponentModel.Primitives.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
System.ComponentModel.Primitives.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
System.Console.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
System.Console.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
System.Diagnostics.Process.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
System.Diagnostics.Process.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
System.Linq.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
System.Linq.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
System.Memory.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
System.Memory.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
System.Private.CoreLib.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
System.Private.CoreLib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
System.Runtime.InteropServices.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
System.Runtime.InteropServices.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
System.Runtime.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
System.Runtime.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
System.Text.Encoding.Extensions.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
System.Text.Encoding.Extensions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
System.Threading.Thread.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
System.Threading.Thread.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
System.Threading.dll
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
System.Threading.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
WinUpdateHelper.deps.json
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
WinUpdateHelper.deps.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
WinUpdateHelper.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
WinUpdateHelper.exe
Resource
win10v2004-20241007-en
General
-
Target
WinUpdateHelper.deps.json
-
Size
33KB
-
MD5
64a780afe42da01052f1844e4a33cb2d
-
SHA1
9b487e249e30b120026e8994a420d89fd9091799
-
SHA256
10f481bf9bce9318a79d5dc5bd17e19908b5ed419062c70a1a7e400992d8da86
-
SHA512
0a277cb89598262d62b90fd994be478e9ed7d4b25c95fa06885393b730ef1a59443aea89f0c3fdd370a90c41cd2b0f7cffacb3d80619c016c2910364d14364f3
-
SSDEEP
768:+NKjVEsIhKPMEPrT3XCGjDyiEc6BHa21Fe8kFN92uwtEeCJK4:pjVEsIhKPMEPrT3XCGjDyiEc6BHa21F6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 AcroRd32.exe 2572 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2916 2680 cmd.exe 31 PID 2680 wrote to memory of 2916 2680 cmd.exe 31 PID 2680 wrote to memory of 2916 2680 cmd.exe 31 PID 2916 wrote to memory of 2572 2916 rundll32.exe 32 PID 2916 wrote to memory of 2572 2916 rundll32.exe 32 PID 2916 wrote to memory of 2572 2916 rundll32.exe 32 PID 2916 wrote to memory of 2572 2916 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WinUpdateHelper.deps.json1⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\WinUpdateHelper.deps.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\WinUpdateHelper.deps.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5720dfc53d6efec1517d8b2a3bc706a68
SHA11fde2daec0a1981572fb2beae4b235a9680268ef
SHA25605c569b11383f6574457f86a4fee0dac6f563d615e821d6e1ff83bdc23e5baa5
SHA5129986cb34c70e20e99fc195dc7f637965a48d599996336a0f339c778b7665e09f087073db747f6a7334c9ec06dbe1402559a442abf1326ed98be58f5dfa386597