Analysis
-
max time kernel
31s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
9fbe02c0d50414bee1f6dc33d7ceabd0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9fbe02c0d50414bee1f6dc33d7ceabd0N.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
9fbe02c0d50414bee1f6dc33d7ceabd0N.exe
-
Size
41KB
-
MD5
9fbe02c0d50414bee1f6dc33d7ceabd0
-
SHA1
e2c63d9b174147f0bba3c8eb99864966deb0031e
-
SHA256
cdaf783e1141ba698ad8a695e5c04d5de50cd51318e64fb9f6517cdb1b512dc6
-
SHA512
5ba09d5545f4bdbeea62dee1a239795612c0d21492b1c211ad69b4b4e68a98ca47b0f80757221e3bbd51e3f41a2def617eb6145b0495d1ce655511beb4a8a422
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhh:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 940 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 940 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 9fbe02c0d50414bee1f6dc33d7ceabd0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 9fbe02c0d50414bee1f6dc33d7ceabd0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fbe02c0d50414bee1f6dc33d7ceabd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 556 wrote to memory of 940 556 9fbe02c0d50414bee1f6dc33d7ceabd0N.exe 84 PID 556 wrote to memory of 940 556 9fbe02c0d50414bee1f6dc33d7ceabd0N.exe 84 PID 556 wrote to memory of 940 556 9fbe02c0d50414bee1f6dc33d7ceabd0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fbe02c0d50414bee1f6dc33d7ceabd0N.exe"C:\Users\Admin\AppData\Local\Temp\9fbe02c0d50414bee1f6dc33d7ceabd0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5456cbe39a919f94cff788a354a0dadc1
SHA1bfb2265a83f275cc4e1e9bc3bafaa0a7351e929d
SHA256bc566fcca2afa1549589014d9a8ee809dd136fba3d1a02e32b132d96dfacfba4
SHA5125b1ba49133c68a99685f22564e1f4e66c69f53f5037253f0d82774df5873ef958c521eb70cb2b69cedabf9f734ba37e71e91433b19f0ba18d7e354b5ec9a98f3