Overview
overview
8Static
static
3DeltaExecutor.zip
windows7-x64
8DeltaExecutor.exe
windows7-x64
8System.Col...ns.dll
windows7-x64
1System.Com...es.dll
windows7-x64
1System.Console.dll
windows7-x64
1System.Dia...ss.dll
windows7-x64
1System.Linq.dll
windows7-x64
1System.Memory.dll
windows7-x64
1System.Pri...ib.dll
windows7-x64
1System.Run...es.dll
windows7-x64
1System.Runtime.dll
windows7-x64
1System.Tex...ns.dll
windows7-x64
1System.Thr...ad.dll
windows7-x64
1System.Threading.dll
windows7-x64
1WinUpdateH...s.json
windows7-x64
3WinUpdateHelper.exe
windows7-x64
1clrjit.dll
windows7-x64
1coreclr.dll
windows7-x64
1hostfxr.dll
windows7-x64
1hostpolicy.dll
windows7-x64
1Resubmissions
01-01-2025 20:08
250101-yw3eystrcl 801-01-2025 20:04
250101-ytbt8a1qe1 801-01-2025 20:01
250101-yrhvra1pgx 801-01-2025 14:10
250101-rgpf8axnaw 10Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 20:08
Static task
static1
Behavioral task
behavioral1
Sample
DeltaExecutor.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DeltaExecutor.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
System.Collections.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
System.ComponentModel.Primitives.dll
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
System.Console.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
System.Diagnostics.Process.dll
Resource
win7-20241010-en
Behavioral task
behavioral7
Sample
System.Linq.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
System.Memory.dll
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
System.Private.CoreLib.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
System.Runtime.InteropServices.dll
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
System.Runtime.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
System.Text.Encoding.Extensions.dll
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
System.Threading.Thread.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
System.Threading.dll
Resource
win7-20240708-en
Behavioral task
behavioral15
Sample
WinUpdateHelper.deps.json
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
WinUpdateHelper.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
clrjit.dll
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
coreclr.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
hostfxr.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
hostpolicy.dll
Resource
win7-20240903-en
General
-
Target
WinUpdateHelper.deps.json
-
Size
33KB
-
MD5
64a780afe42da01052f1844e4a33cb2d
-
SHA1
9b487e249e30b120026e8994a420d89fd9091799
-
SHA256
10f481bf9bce9318a79d5dc5bd17e19908b5ed419062c70a1a7e400992d8da86
-
SHA512
0a277cb89598262d62b90fd994be478e9ed7d4b25c95fa06885393b730ef1a59443aea89f0c3fdd370a90c41cd2b0f7cffacb3d80619c016c2910364d14364f3
-
SSDEEP
768:+NKjVEsIhKPMEPrT3XCGjDyiEc6BHa21Fe8kFN92uwtEeCJK4:pjVEsIhKPMEPrT3XCGjDyiEc6BHa21F6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2796 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2796 AcroRd32.exe 2796 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2724 2956 cmd.exe 31 PID 2956 wrote to memory of 2724 2956 cmd.exe 31 PID 2956 wrote to memory of 2724 2956 cmd.exe 31 PID 2724 wrote to memory of 2796 2724 rundll32.exe 32 PID 2724 wrote to memory of 2796 2724 rundll32.exe 32 PID 2724 wrote to memory of 2796 2724 rundll32.exe 32 PID 2724 wrote to memory of 2796 2724 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\WinUpdateHelper.deps.json1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\WinUpdateHelper.deps.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\WinUpdateHelper.deps.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5be97c9d3c7f60926a60d34f11f9ede08
SHA1aeb104f66fdf93ba7515c314280271a1768c6be0
SHA256e19bf60948c4efadf32aa92a820627fa00ff3f7d41462b1a541d180419879034
SHA51241708f370d14b16d7038477bd7ae279b6e836ef8251f0840715431a317de0f025be577eb35b10bd2384d0e482c947c0ce5df6a0304bc4fb99690f521b320e39d