Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 19:41
Static task
static1
Behavioral task
behavioral1
Sample
775560ed6100d308e5dd68b29f6008e0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
775560ed6100d308e5dd68b29f6008e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
775560ed6100d308e5dd68b29f6008e0N.exe
-
Size
55KB
-
MD5
775560ed6100d308e5dd68b29f6008e0
-
SHA1
daf79833b1cf75cb83249122bb128f8c9c511c77
-
SHA256
489ef84a8724cd5688d47710610aa46ca2bb61c72285d379637473d30feeffe0
-
SHA512
b6eb02d0f2868cf57a007df484a368e4dd6181388fc8f8d1696579a31db7ea80f82a67cfa0d606d34320bfcbdf8a0dca7c1d3eba4d99874e6734469d01108fcf
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIB:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2332 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2332 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 775560ed6100d308e5dd68b29f6008e0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 775560ed6100d308e5dd68b29f6008e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 775560ed6100d308e5dd68b29f6008e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2332 4364 775560ed6100d308e5dd68b29f6008e0N.exe 84 PID 4364 wrote to memory of 2332 4364 775560ed6100d308e5dd68b29f6008e0N.exe 84 PID 4364 wrote to memory of 2332 4364 775560ed6100d308e5dd68b29f6008e0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\775560ed6100d308e5dd68b29f6008e0N.exe"C:\Users\Admin\AppData\Local\Temp\775560ed6100d308e5dd68b29f6008e0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5432e3769c64419c8fff6c3f7445e0f37
SHA165f6b04c6d112968094626b88c2c4398b47b7f9c
SHA256cd241bad33e3774acf3dca46513f94eb975ac11fa6d2d0bfac1109403e0a713d
SHA512440756a1b022e55c083824dc32020c51d56a8f44047343da6f1e00a31d6adc9c23ccd41fa1da05de4975b0bab83408ff427e58e2fc669a348aca0b64914693e3