Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
8ec5af38d27aa72edba5c893f49c5500N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ec5af38d27aa72edba5c893f49c5500N.exe
Resource
win10v2004-20240802-en
General
-
Target
8ec5af38d27aa72edba5c893f49c5500N.exe
-
Size
42KB
-
MD5
8ec5af38d27aa72edba5c893f49c5500
-
SHA1
83cdfdc5774d50fbfb04254e698274ecdf3ad122
-
SHA256
2a68a305381c6dae76680353e946378e5e05481a351788085e37925afd1c23ca
-
SHA512
a3d957ee257c5be8a91ac8c14a3bec4c304f28e830579d1d70245d6d1096d1e1dfd0ec6fd28d9797a24d2da2facd14f8c3b26159e8798f32d43b51cf527f607d
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh+:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4756 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 8ec5af38d27aa72edba5c893f49c5500N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 8ec5af38d27aa72edba5c893f49c5500N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ec5af38d27aa72edba5c893f49c5500N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1800 wrote to memory of 4756 1800 8ec5af38d27aa72edba5c893f49c5500N.exe 83 PID 1800 wrote to memory of 4756 1800 8ec5af38d27aa72edba5c893f49c5500N.exe 83 PID 1800 wrote to memory of 4756 1800 8ec5af38d27aa72edba5c893f49c5500N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ec5af38d27aa72edba5c893f49c5500N.exe"C:\Users\Admin\AppData\Local\Temp\8ec5af38d27aa72edba5c893f49c5500N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD50b1e18d57c0326d570616d7410d0ee97
SHA14e3a6dacc9a4576d3a17014a282851b973e3674f
SHA256fe390aee0b8ba29a45d093ed3ad68754982bcd0705a45949d5c6628d5b9bae1b
SHA512f5b34b443c5c7aa735d2d77994649be615b09c871e7a614d0e683d53e4cfed439ea0eea7221ea31824d27dbafd39d9587064e35c5470aeab1e0fc8f1584122d5