Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe
Resource
win10v2004-20240802-en
General
-
Target
eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe
-
Size
24KB
-
MD5
dbde0e897d7db8107c87e9b9bfc76620
-
SHA1
498c1480a76b8afbf055b8883b2230387024a2c2
-
SHA256
eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7
-
SHA512
418ca7aa1f837e029182e7e6199fbfdbf57ec8716dba5cd69ea50518e9e02be6b222bb1e59e255ff83f62cf7a47225538efae6b66a8a45427a28fe1c63889f3f
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wk7IErqyEOGNFbuSxhLIsv/hDhtMhI3:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wkk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2580 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2580 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2580 4824 eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe 82 PID 4824 wrote to memory of 2580 4824 eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe 82 PID 4824 wrote to memory of 2580 4824 eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe"C:\Users\Admin\AppData\Local\Temp\eddfac5e5745a68697d4745031e207e7c447ffdf29e92cb62a3cc1279da483b7N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD57d0c74d1ad1cc1f9b84d2064bfd1d1e0
SHA1648ae68b2e429eec66bebacc678208c39de859af
SHA256229d839a2f39e1b8d0ae18d751b2c9a41af641c85ee4ddef9d475a5a007edbd1
SHA51240626b7d78c9023ed9f5bab2ad62b4341cd2d211983933a0e6fd1e43f13cfcfda75cb5cbba2fd12008da50856e174164a230973a3924c4ebcd8d643171a73ac5