Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 21:41
Static task
static1
Behavioral task
behavioral1
Sample
10b695dfbdec1a644b6ae2839222bc50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
10b695dfbdec1a644b6ae2839222bc50N.exe
Resource
win10v2004-20240802-en
General
-
Target
10b695dfbdec1a644b6ae2839222bc50N.exe
-
Size
93KB
-
MD5
10b695dfbdec1a644b6ae2839222bc50
-
SHA1
048b71aacc6ddab06bd3896bfd67ec609217600a
-
SHA256
8e80b3518cb65ccf0eb1c1296061bfadc5b61f2673c6b7185fe27774b5969564
-
SHA512
3848dab6c7be848d68c9235593ed005af579339b66f38c088e540681cc91e506baddab4252f24041120d68598c0ab78ddeef7a7ea3a88cf6de607a9aa3dec6fa
-
SSDEEP
1536:/Ao0+j2d6rnJqlIUSJn3m2GnNCyuaMeFg8kVQ+SvMupWsZZZNF01Lryhv1g1s1E2:/AoVl4lXin3m2GnNCyuaMeFg8kVQ+Svd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4756 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 10b695dfbdec1a644b6ae2839222bc50N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 10b695dfbdec1a644b6ae2839222bc50N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10b695dfbdec1a644b6ae2839222bc50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3912 wrote to memory of 4756 3912 10b695dfbdec1a644b6ae2839222bc50N.exe 83 PID 3912 wrote to memory of 4756 3912 10b695dfbdec1a644b6ae2839222bc50N.exe 83 PID 3912 wrote to memory of 4756 3912 10b695dfbdec1a644b6ae2839222bc50N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\10b695dfbdec1a644b6ae2839222bc50N.exe"C:\Users\Admin\AppData\Local\Temp\10b695dfbdec1a644b6ae2839222bc50N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5b1cdcaeab04752b283737ca33272142f
SHA10cc1fb8f8f7abf428f6cb8acb8936c53e27a6869
SHA2568c6ccb659e9a6beea30408eba411fe366298a27b5e37897541f6e288bd1cb008
SHA5125aef21ba27ebab3817022d4e4701c539f507d66c06ab9e3e0c4e5bcb3a2844290fcce2ca51f863501f4fe2a679783794490ee67039aeb1a80e3bc1cf163c35ff