Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
6699cd45d79e899db07cd14d3dc26380N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6699cd45d79e899db07cd14d3dc26380N.exe
Resource
win10v2004-20240802-en
General
-
Target
6699cd45d79e899db07cd14d3dc26380N.exe
-
Size
45KB
-
MD5
6699cd45d79e899db07cd14d3dc26380
-
SHA1
3be9a8d1c59e26ebc1119917fd7ea7559a0de1e4
-
SHA256
408fc1796ab10ab97b485c967d2cef2f888eacdde65ba80e5892cef63e6feec7
-
SHA512
434566d1cd763d3a55cde3eb19ec481039b7b1c4defd81813135b5173bb18d5384085eff4db5fb11bbf493d12816d8dc818aacd491c5bf2862108c04ef6674d9
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhe:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 336 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 336 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 6699cd45d79e899db07cd14d3dc26380N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 6699cd45d79e899db07cd14d3dc26380N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6699cd45d79e899db07cd14d3dc26380N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 724 wrote to memory of 336 724 6699cd45d79e899db07cd14d3dc26380N.exe 84 PID 724 wrote to memory of 336 724 6699cd45d79e899db07cd14d3dc26380N.exe 84 PID 724 wrote to memory of 336 724 6699cd45d79e899db07cd14d3dc26380N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6699cd45d79e899db07cd14d3dc26380N.exe"C:\Users\Admin\AppData\Local\Temp\6699cd45d79e899db07cd14d3dc26380N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD52245d62ab8676a81124ef62a2b80121a
SHA194d87e0b834c53f6441345a6b7f871d8db4509b1
SHA25640d5541eaf8ad5b8d23151d8a562b42cdfbeede9080b7f65f9730eafcb75a3ec
SHA5121a6c7bb9a7e182229e79a9308f908f5c4c42184aa2a874a14408a5963b90cd72eeb265adf735a14a7f833bc34ae22ca2f1e7e41e3b3057a3d74baf8aa23bf03d