Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
db809396a444d96e01f0a0c98d8db580N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db809396a444d96e01f0a0c98d8db580N.exe
Resource
win10v2004-20240802-en
General
-
Target
db809396a444d96e01f0a0c98d8db580N.exe
-
Size
41KB
-
MD5
db809396a444d96e01f0a0c98d8db580
-
SHA1
ae670b7f30e0be740de8522e75630fc86a829e60
-
SHA256
5fc351c3de5088a23ed131b4539000a7066b92af02ba7780dbb43b1f7641b5db
-
SHA512
43c1a7e2b915df99f894b2faf27be2412c39d1c954258e6630a380d2a4a5244299086ba74567819c1e35867f6bbad0bddfbb5e308127eb797f1cebd02c159c3d
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhb:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3316 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3316 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" db809396a444d96e01f0a0c98d8db580N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe db809396a444d96e01f0a0c98d8db580N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db809396a444d96e01f0a0c98d8db580N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4084 wrote to memory of 3316 4084 db809396a444d96e01f0a0c98d8db580N.exe 86 PID 4084 wrote to memory of 3316 4084 db809396a444d96e01f0a0c98d8db580N.exe 86 PID 4084 wrote to memory of 3316 4084 db809396a444d96e01f0a0c98d8db580N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\db809396a444d96e01f0a0c98d8db580N.exe"C:\Users\Admin\AppData\Local\Temp\db809396a444d96e01f0a0c98d8db580N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5f123133291efafd8a2018bb4fe3055bf
SHA1e005442cc6938c5ceaf56a6a8a3f9dd6125422b0
SHA256bceca58ac3159360a1d5e3e2879cc067641d853c8809e7b00608b6fd2a262c52
SHA5127d6fc9707002f6afe37597695aa31a7fd94e0d80eec3f7168f26aa91646b0fc30d1a01eaaf8ca7ba6779ec02ba73624b70687bdff0e31de83521fbcc32801391