Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
896b0a4020d7e080436ae73188ebd580N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
896b0a4020d7e080436ae73188ebd580N.exe
Resource
win10v2004-20240802-en
General
-
Target
896b0a4020d7e080436ae73188ebd580N.exe
-
Size
43KB
-
MD5
896b0a4020d7e080436ae73188ebd580
-
SHA1
9e870620f44ca5e7b9cdd609a32dbdb372ad806e
-
SHA256
a913f398e533b60c87bb3cfc90609a9efef6727e092da78564744eb5542fa85a
-
SHA512
5dc9c22326cdb0cbde467954e6694c886f598ef989a113e2c66825e1c8aa2c7785e05dee39c355cd7f39ed0a441fd091a4682b3ef8b260ff992180e5ee12d71b
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh7:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4724 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4724 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 896b0a4020d7e080436ae73188ebd580N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 896b0a4020d7e080436ae73188ebd580N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 896b0a4020d7e080436ae73188ebd580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3292 wrote to memory of 4724 3292 896b0a4020d7e080436ae73188ebd580N.exe 83 PID 3292 wrote to memory of 4724 3292 896b0a4020d7e080436ae73188ebd580N.exe 83 PID 3292 wrote to memory of 4724 3292 896b0a4020d7e080436ae73188ebd580N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\896b0a4020d7e080436ae73188ebd580N.exe"C:\Users\Admin\AppData\Local\Temp\896b0a4020d7e080436ae73188ebd580N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5ce9f7a428486ed2091ebb6ecbde534f6
SHA1108d0b7feea6c862ee1ea87b2b949cace6e7106d
SHA256c175785965f7065d8941e7c51c75f9383f1caaf3e4ac3a1aca2e6a7e059500f1
SHA512478d156467f77a4e664167f04c41a0e91741fbaf0a1128f2494f918ec1d0a11358d88bd404430cf08c7253ba67f0f5bcea944a7cabd26b30a51951da540735ed