Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
75aed9f09a49acb4eb392ea6c06f12f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75aed9f09a49acb4eb392ea6c06f12f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
75aed9f09a49acb4eb392ea6c06f12f0N.exe
-
Size
40KB
-
MD5
75aed9f09a49acb4eb392ea6c06f12f0
-
SHA1
018b5cb20a0e3e8971fe2657dabf98788639aac8
-
SHA256
638877c431631c46abb8697d2dae2adb0031a4097475f54d2630ceb658799e9f
-
SHA512
f409dff8d6f98e9ed0bf5ec84679b43f0fef40d491200639b6b95c481514495d697f69541cbbafcb3c81b7fd112f79fab4eb507d841ef61d22e4d89ac539a7b6
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhM:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4080 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4080 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 75aed9f09a49acb4eb392ea6c06f12f0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 75aed9f09a49acb4eb392ea6c06f12f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75aed9f09a49acb4eb392ea6c06f12f0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 676 wrote to memory of 4080 676 75aed9f09a49acb4eb392ea6c06f12f0N.exe 91 PID 676 wrote to memory of 4080 676 75aed9f09a49acb4eb392ea6c06f12f0N.exe 91 PID 676 wrote to memory of 4080 676 75aed9f09a49acb4eb392ea6c06f12f0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\75aed9f09a49acb4eb392ea6c06f12f0N.exe"C:\Users\Admin\AppData\Local\Temp\75aed9f09a49acb4eb392ea6c06f12f0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4436,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=3828 /prefetch:81⤵PID:2184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD597176d5215dc45704960a0bd2eb2bf7e
SHA1a61605d31feb2ee9e7c7d377ef22978fb4773cdc
SHA2563ac86a75019f5ebedccca48ccc71c8c4aa83f3cda058b491837777409ebfacbb
SHA512a538b279279fe312676c2f21bcdc3267460c0b68c9be753ddf6c12a3f23b7879f535c814140a08d58b7b0960f18f85382b8a397ee952d1120b160823567a530b