Analysis
-
max time kernel
119s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 03:01
Static task
static1
Behavioral task
behavioral1
Sample
534323816741e57ad332237cc47925a0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
534323816741e57ad332237cc47925a0N.exe
Resource
win10v2004-20240802-en
General
-
Target
534323816741e57ad332237cc47925a0N.exe
-
Size
45KB
-
MD5
534323816741e57ad332237cc47925a0
-
SHA1
b2730c5b87153a4e8e57c7c672ff4c387521dec9
-
SHA256
b55b35a95b8314a3b5951dafaaf2007f5889b09346eae97e2baed7446958d17c
-
SHA512
e34b51f2a0a6849a14c7640353ab701044bd079d36f202744da38ce67e6401eb4264adfb4d3b882438664a9185ba7296516d922aa1dbd809a692d0504d3f4728
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhc:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3296 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3296 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 534323816741e57ad332237cc47925a0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 534323816741e57ad332237cc47925a0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 534323816741e57ad332237cc47925a0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5012 wrote to memory of 3296 5012 534323816741e57ad332237cc47925a0N.exe 83 PID 5012 wrote to memory of 3296 5012 534323816741e57ad332237cc47925a0N.exe 83 PID 5012 wrote to memory of 3296 5012 534323816741e57ad332237cc47925a0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\534323816741e57ad332237cc47925a0N.exe"C:\Users\Admin\AppData\Local\Temp\534323816741e57ad332237cc47925a0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5cc8cc860e137b60eb2a000c0b9f781bd
SHA10d525b949042e8ce2f92a5c6ea034ccdf4ddd427
SHA25658475d5e6af7d399be2e7e563fd589e7d32bd63bd80e11f8bde58688a5be217c
SHA512a101faf621703c1cda56916fa73dbefe0f1167797b2e10446bf1a7205d78301e99f6c1c3b1db3430b0ac7b6497314889c094508bc0d1ad5b78db6dbe672e0fda