Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
08dbc9066e3db63550ceed13fd404e60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
08dbc9066e3db63550ceed13fd404e60N.exe
Resource
win10v2004-20240709-en
General
-
Target
08dbc9066e3db63550ceed13fd404e60N.exe
-
Size
38KB
-
MD5
08dbc9066e3db63550ceed13fd404e60
-
SHA1
88f98ba60ba9eb83e580df95fb758cf0a18d012f
-
SHA256
d687353dc18586f1bcb81e04bc8ac529fa8f3d54f0f7ca3446483b1204bf925d
-
SHA512
7483c3ce4569eb9ed4bf0e60c2229f101de5602ee48477ed2784aaa9e51d1614997ca0b96d05dec67f7219bdcabbc6ae044ab982417f2e57bf8da7181631e5cf
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhf:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4420 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4420 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 08dbc9066e3db63550ceed13fd404e60N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 08dbc9066e3db63550ceed13fd404e60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08dbc9066e3db63550ceed13fd404e60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 468 wrote to memory of 4420 468 08dbc9066e3db63550ceed13fd404e60N.exe 84 PID 468 wrote to memory of 4420 468 08dbc9066e3db63550ceed13fd404e60N.exe 84 PID 468 wrote to memory of 4420 468 08dbc9066e3db63550ceed13fd404e60N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\08dbc9066e3db63550ceed13fd404e60N.exe"C:\Users\Admin\AppData\Local\Temp\08dbc9066e3db63550ceed13fd404e60N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5f8f21ab1a8984840cd3542573a63c865
SHA1fd98c18afb6dda6b4bc547236e37001c613790a9
SHA2561a20bcf714cb4702d3b315feca5ca7d452ab28fa36283512bfd083cee66d75a8
SHA5124531de412adc1875e666457941f1490809c8460ac90eca0c06a9f2fbfe5a4d8b429ae0da572a398d96d43ab8b6639251152a5404e1c39a5d075eb003f26e19e2