Analysis
-
max time kernel
119s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
122c6829aa35ec94ef53b8d67d16d5d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
122c6829aa35ec94ef53b8d67d16d5d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
122c6829aa35ec94ef53b8d67d16d5d0N.exe
-
Size
58KB
-
MD5
122c6829aa35ec94ef53b8d67d16d5d0
-
SHA1
5d9f833b8d973b396bb46932f3c2f0a3ca4b6032
-
SHA256
f1d7ac7f65086e21379d897e637ba047ab45046787102fb1c7769714a7bc1494
-
SHA512
be335189d82798fefb09d74bcf6dd6bbbe5960fb110401626d91c799effc49d5e0f13b85499d4c8a49c5e5f4861cf8ad67680329cbcfeef131866bbd19472fcf
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIO:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5136 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 5136 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 122c6829aa35ec94ef53b8d67d16d5d0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 122c6829aa35ec94ef53b8d67d16d5d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 122c6829aa35ec94ef53b8d67d16d5d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2340 wrote to memory of 5136 2340 122c6829aa35ec94ef53b8d67d16d5d0N.exe 87 PID 2340 wrote to memory of 5136 2340 122c6829aa35ec94ef53b8d67d16d5d0N.exe 87 PID 2340 wrote to memory of 5136 2340 122c6829aa35ec94ef53b8d67d16d5d0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\122c6829aa35ec94ef53b8d67d16d5d0N.exe"C:\Users\Admin\AppData\Local\Temp\122c6829aa35ec94ef53b8d67d16d5d0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD58321c14f4dd41a7334167bee7f355865
SHA1d2c96dd39ecea97723c019ccab5c39328f8a3270
SHA256c12843fdd405d0a4b9567716e3c76828ba13e470231bae7a82d723c059fc0dc4
SHA512cd9c064972afab8280442d46dc37c5576cc331c01583b3740123bace0034cb71b55c97c23b7127627673610c22bfd804b0492893d5ce73707ed34cbab8aa1753