Analysis
-
max time kernel
119s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 08:07
Static task
static1
Behavioral task
behavioral1
Sample
357b3abb7e9dcad0aa35793b9576e210N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
357b3abb7e9dcad0aa35793b9576e210N.exe
Resource
win10v2004-20240802-en
General
-
Target
357b3abb7e9dcad0aa35793b9576e210N.exe
-
Size
51KB
-
MD5
357b3abb7e9dcad0aa35793b9576e210
-
SHA1
83b6b8268b10f264846dac656ab90659dbda01fe
-
SHA256
91609856f53d49204e1584bc842266a10ed60d18c5c41f55c817df94662db75d
-
SHA512
7b88f1fc064be9de0f997e950970d7c58256c65ee07572318827fe097c443358a3fa1ba32b67e4b5143a55a253bbfe16ad11fe51c114b78c4f434f93a3c2edc0
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIw:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4688 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4688 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 357b3abb7e9dcad0aa35793b9576e210N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 357b3abb7e9dcad0aa35793b9576e210N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 357b3abb7e9dcad0aa35793b9576e210N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 4688 2100 357b3abb7e9dcad0aa35793b9576e210N.exe 83 PID 2100 wrote to memory of 4688 2100 357b3abb7e9dcad0aa35793b9576e210N.exe 83 PID 2100 wrote to memory of 4688 2100 357b3abb7e9dcad0aa35793b9576e210N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\357b3abb7e9dcad0aa35793b9576e210N.exe"C:\Users\Admin\AppData\Local\Temp\357b3abb7e9dcad0aa35793b9576e210N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD552f9826237308a6b13b8c858fd6bb669
SHA17e86384daf2c1ce7a5134155525ddf633c16a55a
SHA256b9554be02c1dbfe39d714ac60e5ea8ddbed0a874211843740ff965b63b691192
SHA512052ceb210c5cc291308a7ab8f7c4866f02d7bf94c468bf0e335649eca9e34876ae6ed3fe6d55ce390cb7c506928044b890d1a2477a5dec5ef536f1b8261de015