Analysis
-
max time kernel
120s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
c4e5bdb7263ffd9d6c2209c6a5609170N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c4e5bdb7263ffd9d6c2209c6a5609170N.exe
Resource
win10v2004-20240802-en
General
-
Target
c4e5bdb7263ffd9d6c2209c6a5609170N.exe
-
Size
47KB
-
MD5
c4e5bdb7263ffd9d6c2209c6a5609170
-
SHA1
29f6fbed4126a63e8b75200882cdb6ceaba97707
-
SHA256
b42f409312460e0e3105373826b5e2ca514fc11763de22a39f3a648c6a598958
-
SHA512
79da97d14bf54151478eec370eb73d027c0e410c55a3bb6bc892f66be91f90eb847aaa3e5ee4745b2e28add5d6c204a264dfdab8b6927c31e1702fd79e6935f3
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhN:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2212 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" c4e5bdb7263ffd9d6c2209c6a5609170N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe c4e5bdb7263ffd9d6c2209c6a5609170N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4e5bdb7263ffd9d6c2209c6a5609170N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3760 wrote to memory of 2212 3760 c4e5bdb7263ffd9d6c2209c6a5609170N.exe 84 PID 3760 wrote to memory of 2212 3760 c4e5bdb7263ffd9d6c2209c6a5609170N.exe 84 PID 3760 wrote to memory of 2212 3760 c4e5bdb7263ffd9d6c2209c6a5609170N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4e5bdb7263ffd9d6c2209c6a5609170N.exe"C:\Users\Admin\AppData\Local\Temp\c4e5bdb7263ffd9d6c2209c6a5609170N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD58f1170eb7e595a03674205b672b352ce
SHA1a037905fbf3a84f6f27304f6a7bf38bb408cb4d8
SHA256e0e7a97dcf56d282b9ee1e818ab0f1fd7d165628ed338c14e2e5f68d322c6695
SHA512d54e55509407a597c6a25ee00fed9610f3c9e9eaf67669481ea843c7762c3087912c2b76b72b6cb4f7d7ff5a72426a6926097734a469adfcafa3582606a2d18c