Analysis
-
max time kernel
119s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
cac00413358a35e1d0d4b50e89c9df80N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cac00413358a35e1d0d4b50e89c9df80N.exe
Resource
win10v2004-20240802-en
General
-
Target
cac00413358a35e1d0d4b50e89c9df80N.exe
-
Size
41KB
-
MD5
cac00413358a35e1d0d4b50e89c9df80
-
SHA1
f51b70fa6f7f8b3424468c90e12fa119bbb170b5
-
SHA256
56e69db8dd12fcb91547e98307264076ac830348c5ee6cd970f56c192c3af8b1
-
SHA512
7308d89094b758c68e59c59c10957487c13eb94f4b644eab4f20558eb0a35b5afffb6888d7c3b37cefcc9c8301a54307cf4f99cc06ce975002da58a7e25b1f3a
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhm:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3364 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3364 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" cac00413358a35e1d0d4b50e89c9df80N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe cac00413358a35e1d0d4b50e89c9df80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cac00413358a35e1d0d4b50e89c9df80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3364 4220 cac00413358a35e1d0d4b50e89c9df80N.exe 84 PID 4220 wrote to memory of 3364 4220 cac00413358a35e1d0d4b50e89c9df80N.exe 84 PID 4220 wrote to memory of 3364 4220 cac00413358a35e1d0d4b50e89c9df80N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\cac00413358a35e1d0d4b50e89c9df80N.exe"C:\Users\Admin\AppData\Local\Temp\cac00413358a35e1d0d4b50e89c9df80N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5f1eb645559b30e09fc6e5f46e0ad4e16
SHA1d7d32498a9dc5cf7cd8b340948050ca6e4b26422
SHA256a3142e0c4bb9de455aa6c10c052016b2a1c32f81f2a55496170a15d5b20d0bf8
SHA5122085c6d7b97a53dd2c4df64f5bf59b3efd8b61eabdd83510f9304a0fc2fc15b713601c285ce67d1fe5636b21ce71a48f205ba6a3017bab2b4806c1789740db51