Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
4ebcb0f1397b4446a937c6d0affada60N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4ebcb0f1397b4446a937c6d0affada60N.exe
Resource
win10v2004-20240802-en
General
-
Target
4ebcb0f1397b4446a937c6d0affada60N.exe
-
Size
45KB
-
MD5
4ebcb0f1397b4446a937c6d0affada60
-
SHA1
df9ada513fa84dc99bfafc750559426a4eeefd10
-
SHA256
f37f25cff5da182221574e5d0578ef6ae1510312343273a8774eee5172a671e7
-
SHA512
92cf2b864350c63d23c81ee95c3e82e5f0f5b295ad15ff73a11adc81c205163e1062f457e088b627e01621cb7a223d457fe7d261b8518a7dd2030c0313531388
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhX:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 220 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 220 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 4ebcb0f1397b4446a937c6d0affada60N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 4ebcb0f1397b4446a937c6d0affada60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ebcb0f1397b4446a937c6d0affada60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2396 wrote to memory of 220 2396 4ebcb0f1397b4446a937c6d0affada60N.exe 83 PID 2396 wrote to memory of 220 2396 4ebcb0f1397b4446a937c6d0affada60N.exe 83 PID 2396 wrote to memory of 220 2396 4ebcb0f1397b4446a937c6d0affada60N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ebcb0f1397b4446a937c6d0affada60N.exe"C:\Users\Admin\AppData\Local\Temp\4ebcb0f1397b4446a937c6d0affada60N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:220
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5b55e27901556763e03d7c4d5b1c509ea
SHA13a60d71a06737c3544f7c458840ce80f96f252ce
SHA256776d2315372bdf2e238a6c2c15d6957eae2a22a316b4d613dc785afa1012cc70
SHA512296ee010fe0ccf17bd073019767d59bd05363504c5474dca56b5f09b04efddce7fefc66a3c16fdfc16acf59a0c78f134a3068baa8a94211a53f7d6b44abb20a5