Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe
Resource
win10v2004-20240802-en
General
-
Target
d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe
-
Size
49KB
-
MD5
66927ff54ac308d5e0230d339e36dbe0
-
SHA1
92a96cfe4776bfc3dd43c4bf91d8e7299c7c4593
-
SHA256
d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0
-
SHA512
b395598aa2fb504a7c15485d37ccd66c4ca576c987b9fc3e69742fb5848a9697b8a1cdd8d548e9d99e732d862b1c7383e9c9d5798d3d0accd88e21a4b69921da
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhI8:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3668 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3668 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3668 4280 d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe 82 PID 4280 wrote to memory of 3668 4280 d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe 82 PID 4280 wrote to memory of 3668 4280 d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe"C:\Users\Admin\AppData\Local\Temp\d6a4e443d82396a97ce40d38ec93f408a0f1dd10ff5074feffeb71ac0d127af0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
50KB
MD534543f7b237497ac2dea68bfc334702c
SHA1d87df5fddc900af494ef52bd7af670118132531a
SHA2562481bc343c3d0f389de4de565d0f31ae53119deaf1945c8295d0f57b2d47ffbd
SHA512eddd3b6e7bf81c78b458e5c42b9fef8bb20c9bffaa8d3d476821b1474007e5cab4e56423b818f724f9344f8c6c62f5ba4695424f41cc82932e32bf5a1b0b5517