Analysis
-
max time kernel
120s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
4b8554177b20fe30128e500fdaa42900N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4b8554177b20fe30128e500fdaa42900N.exe
Resource
win10v2004-20240802-en
General
-
Target
4b8554177b20fe30128e500fdaa42900N.exe
-
Size
50KB
-
MD5
4b8554177b20fe30128e500fdaa42900
-
SHA1
bc5d30ddce30c70013b8471c3687a513af90205b
-
SHA256
28074df39fb5c578415a9ae0cafa6c3c859d3bc5ff30f9019729b4d8cc200599
-
SHA512
6f25ee463b22151cc909cd28774d57547ac612fc122cff1477ad29832049acea6e07ae779c224b5a33bac87d6c4f94313a01d49b9542d64461eefb0acde545a4
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIv:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYV5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3360 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3360 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 4b8554177b20fe30128e500fdaa42900N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 4b8554177b20fe30128e500fdaa42900N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b8554177b20fe30128e500fdaa42900N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 3360 4272 4b8554177b20fe30128e500fdaa42900N.exe 84 PID 4272 wrote to memory of 3360 4272 4b8554177b20fe30128e500fdaa42900N.exe 84 PID 4272 wrote to memory of 3360 4272 4b8554177b20fe30128e500fdaa42900N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b8554177b20fe30128e500fdaa42900N.exe"C:\Users\Admin\AppData\Local\Temp\4b8554177b20fe30128e500fdaa42900N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD5874c445f7a2da2196ebb66311e772f63
SHA1b3ccbf8fefe2482934f44a7303e42c9e68681b05
SHA2564deaee92a0510cccb5ddd061c382f9ee3945b1de34780b6466054d898a0139ac
SHA512935b1c599900357698f07a841c5a2f3497b1dcce5a9e70a9aa899e15c0c3ba76c842920c1ced973f55cf614a755f497677e8bbabfff27bcf5de5d3cb4b99ef0e