Analysis
-
max time kernel
119s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
92687c6b6c6c0d4966bf26fece8daf30N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
92687c6b6c6c0d4966bf26fece8daf30N.exe
Resource
win10v2004-20240802-en
General
-
Target
92687c6b6c6c0d4966bf26fece8daf30N.exe
-
Size
41KB
-
MD5
92687c6b6c6c0d4966bf26fece8daf30
-
SHA1
ab6e14d52bb8f66b4ff7b390500bd26bea25a0b9
-
SHA256
19b76f2bed4cedd456f1d2b72664d8c9cb2787f66d71932587d10f20c0912594
-
SHA512
a76b4d3d5f925ead1f7549f8b5c859cdf45ecd8b6837844d656c7114da08312c57c80e22b12abebd856f8ed74e469fe45f8d2324b7061ace5d8f475ab2adc6ad
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhG:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4500 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4500 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 92687c6b6c6c0d4966bf26fece8daf30N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 92687c6b6c6c0d4966bf26fece8daf30N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92687c6b6c6c0d4966bf26fece8daf30N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 468 wrote to memory of 4500 468 92687c6b6c6c0d4966bf26fece8daf30N.exe 83 PID 468 wrote to memory of 4500 468 92687c6b6c6c0d4966bf26fece8daf30N.exe 83 PID 468 wrote to memory of 4500 468 92687c6b6c6c0d4966bf26fece8daf30N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\92687c6b6c6c0d4966bf26fece8daf30N.exe"C:\Users\Admin\AppData\Local\Temp\92687c6b6c6c0d4966bf26fece8daf30N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5d277eab42eddf55a2b385b6dc362d3e6
SHA12bf6eed0a3fb390c8a306c5a4402a9eb2c785733
SHA256319b287d0e287e2a9a39674e2802053e390abc32c6e49d0216a94a5ceaac04a3
SHA5129b72b21cb12a17fdec681f238aa9760d92a04dec38b0be7203698b499ea3877797f6e74520ff0f4c0db5ca38526f60a9b7ed977d084a263302ada07c60f3c96d