Analysis
-
max time kernel
119s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
083697ded4fc2defa67488a847bf9930N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
083697ded4fc2defa67488a847bf9930N.exe
Resource
win10v2004-20240802-en
General
-
Target
083697ded4fc2defa67488a847bf9930N.exe
-
Size
41KB
-
MD5
083697ded4fc2defa67488a847bf9930
-
SHA1
774e2f426430ff1b3b9ecc87ca17138c27b4f85b
-
SHA256
6f577e95f1a9ece4b229401d4a2ab299ab4175f3a23394da42548e101a10c301
-
SHA512
cbc80b476323b1dffbabd419b5471692244b6edcebcbfcfd2db0c87cdb917f2a7301816302cb07dbc4ca19ae4b5498f5b7ed2bf88fbe72c1028cce0118f1a216
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhc:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY8
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4300 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4300 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 083697ded4fc2defa67488a847bf9930N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 083697ded4fc2defa67488a847bf9930N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 083697ded4fc2defa67488a847bf9930N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1884 wrote to memory of 4300 1884 083697ded4fc2defa67488a847bf9930N.exe 85 PID 1884 wrote to memory of 4300 1884 083697ded4fc2defa67488a847bf9930N.exe 85 PID 1884 wrote to memory of 4300 1884 083697ded4fc2defa67488a847bf9930N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\083697ded4fc2defa67488a847bf9930N.exe"C:\Users\Admin\AppData\Local\Temp\083697ded4fc2defa67488a847bf9930N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5b76022818bacb596a40ebe2060f6d41e
SHA1e1a1139552139988141aab7eb732930fb056e992
SHA256d3dd9ea923a186b95831c35703f3a5c71e5c60b77b6f5c73d3fe8eee84a1a398
SHA512baeff24a52becf4d7fb6189e2c64066a0b73cb8538d7b1d88e32b998157d0cba55701b5226704664e491f511a8c2fc7ad689bda8223ef30bb577380bf3b14781