Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
21bfb71331b476e357363a791c3c8450N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
21bfb71331b476e357363a791c3c8450N.exe
Resource
win10v2004-20240802-en
General
-
Target
21bfb71331b476e357363a791c3c8450N.exe
-
Size
47KB
-
MD5
21bfb71331b476e357363a791c3c8450
-
SHA1
fdb11bbefe70300b6f92477db331fd9a994ed0d4
-
SHA256
9caa1cdcd41a24eeea2abd80e356a2f160ff8dd138df0c7494784a6a38fb0054
-
SHA512
23ef4138656db6bfe34430a49b831ee4594b81a6772585d15bcd8b5a87c2749bdfba2137e7f08cbc5c03bfebfaf6bdf4797b5c21c1da4a110ac556af7885fffa
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh2:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3672 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3672 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 21bfb71331b476e357363a791c3c8450N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 21bfb71331b476e357363a791c3c8450N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21bfb71331b476e357363a791c3c8450N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3780 wrote to memory of 3672 3780 21bfb71331b476e357363a791c3c8450N.exe 84 PID 3780 wrote to memory of 3672 3780 21bfb71331b476e357363a791c3c8450N.exe 84 PID 3780 wrote to memory of 3672 3780 21bfb71331b476e357363a791c3c8450N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\21bfb71331b476e357363a791c3c8450N.exe"C:\Users\Admin\AppData\Local\Temp\21bfb71331b476e357363a791c3c8450N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5296d048ac8c7a219cb995293adead20c
SHA17a6b373e7e9e935448ec34dd419a07e911e228ad
SHA25689489b616d76a8b3931078ef2830aafa4f810676718302f0a8df326cb00ae0a2
SHA5129263dea8561c984cb5bbb3e1c7a146a6e9e151f5886466d5bce206ff287c7d4a963bfd935d2e9776a28bab8e87f455e46f8e165d9d3945b1d35cd0902eb49a0e