Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-01-2025 09:16
Static task
static1
Behavioral task
behavioral1
Sample
WinHelpc32.exe
Resource
win7-20240729-en
General
-
Target
WinHelpc32.exe
-
Size
1.5MB
-
MD5
4df31cd1a0ede3a4d35e720c81f8f970
-
SHA1
f8930d6dc53bfb43aa53ca089a94d3d4c6e85c08
-
SHA256
b5b2d5f9800ecf5a4d542c3b3c0812d2fb0f6ffe4333424797d2dbc13ef7739a
-
SHA512
8f43c75fa83e86ec910b7ca25065aa240124034ebe4f16696890e7e79c33b7f0bf741184d8dc7c1e0b50712841b695bf3d48cf85bed8f46e7214f911e835be95
-
SSDEEP
24576:BogQT+D6LJgmzhAhxviiQVd2WAKhhr1AvdCLPatt3AaYfqaP+C5F2oeENHQQBmOT:QTnchxvoVdNo0L0aa/aPd5pFBmOADS
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1804 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinHelpc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1804 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1804 2404 WinHelpc32.exe 30 PID 2404 wrote to memory of 1804 2404 WinHelpc32.exe 30 PID 2404 wrote to memory of 1804 2404 WinHelpc32.exe 30 PID 2404 wrote to memory of 1804 2404 WinHelpc32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinHelpc32.exe"C:\Users\Admin\AppData\Local\Temp\WinHelpc32.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Add-Mppreference -ExclusionPath 'C:\Program Files (x86)', 'C:\' -Force"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-