Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe
Resource
win10v2004-20240802-en
General
-
Target
adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe
-
Size
48KB
-
MD5
96185c44821cb620b5256c6a0b666760
-
SHA1
6e9418867c62f2ebc8f932bd94dd4d81a333163c
-
SHA256
adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02
-
SHA512
302615c1b9c6099fba33ca49844c1664fe161bf2e6c49958b31432051801109f87058c7a012759a631a5ab6302771d7da16267d6cae45abc648f6a7a4236f65c
-
SSDEEP
1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIS:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYV4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1712 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1712 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3472 wrote to memory of 1712 3472 adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe 82 PID 3472 wrote to memory of 1712 3472 adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe 82 PID 3472 wrote to memory of 1712 3472 adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe"C:\Users\Admin\AppData\Local\Temp\adc67b35d7a7700b459fbcc95343be9aa1fed97381ae80375fdc04c4b60d2e02N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD51cad777de626030338ddf69233df0343
SHA1319eee8b9df12cd9477efe16cafa3e441b8292c2
SHA25633fc5453c25b0fc1cc86526d1e2c5663b5a54f8322bcfcd0bcff05cef2a05904
SHA5120ae0108a2b461927f52e51ac4ecfa395d977df80641de2a26f228f13342f653338862cd21313b2eaf47eca763d7b9123e595a232aaebf0be230d58b7470e7296