Analysis
-
max time kernel
119s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
146f03f476ed3f44718342af50166be0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
146f03f476ed3f44718342af50166be0N.exe
Resource
win10v2004-20240802-en
General
-
Target
146f03f476ed3f44718342af50166be0N.exe
-
Size
47KB
-
MD5
146f03f476ed3f44718342af50166be0
-
SHA1
a1a833f89a4cc7176b32a95f250ab2dbf73c734e
-
SHA256
65a3681a419499ebd675b6d7230a4b305cdf0f7a4e24dfc0c9728d7938e76815
-
SHA512
34a6fb45c250804c47fb5300725a4c85feee3ca94261069da262c9474849562a1084994d86fae0f3a0b3e19842ed9fe4f735017d4cfe12d32c928e942235fd36
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh+:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYe
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2372 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2372 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 146f03f476ed3f44718342af50166be0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 146f03f476ed3f44718342af50166be0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 146f03f476ed3f44718342af50166be0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2372 2232 146f03f476ed3f44718342af50166be0N.exe 85 PID 2232 wrote to memory of 2372 2232 146f03f476ed3f44718342af50166be0N.exe 85 PID 2232 wrote to memory of 2372 2232 146f03f476ed3f44718342af50166be0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\146f03f476ed3f44718342af50166be0N.exe"C:\Users\Admin\AppData\Local\Temp\146f03f476ed3f44718342af50166be0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5665c6a1e70aa29b70daeda3baa7187ca
SHA1f29561741ae7c4a3f2e1faf096375412de5bc476
SHA25609cdd87ad6bc456412eedf8693b8d5780b94b8fc6e4ece71b88588b13e0aad9d
SHA512440595e0838107dbb2beb934426414adaf54f913512eb62a01e14d6317c2a5f430f43f06ccc62d8aadd4a9632aba194dd028a62ecef3d2f4d956b0ee423cea5c