Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe
Resource
win10v2004-20240802-en
General
-
Target
9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe
-
Size
34KB
-
MD5
83babc6895fdc2d6c9ef33e9687d73c8
-
SHA1
79378c78df0fd357e8d6032a87f5528fe15ed8df
-
SHA256
9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f
-
SHA512
26c5f89ffc0dae62095a05a464b0aeafe3d18fd4888a205e88e37ebbcb3899d4e8624fe4b7b517ee5abb2e94d70cfde7a25d108ac8d0b54ec77d6748290db7bb
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJjWHw:e6q10k0EFjed6rqJ+6vghzwYu7vih9GV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2484 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2484 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2484 1316 9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe 31 PID 1316 wrote to memory of 2484 1316 9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe 31 PID 1316 wrote to memory of 2484 1316 9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe 31 PID 1316 wrote to memory of 2484 1316 9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe"C:\Users\Admin\AppData\Local\Temp\9acf0b9165c47ad410e42dfd021e6832b9b0f929cdab724507206b7eb985cb3f.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD574ef88b53f27a30aa14cb6d067357d32
SHA13ad714d52a2a16412b4a7d598bb2e8c3f696aad3
SHA2567eb1a9c7d809583d9d6041b7b7b23495ec611d36d7650b70923faa0ab37ddda4
SHA512672d944e9a84639b21c35e287ffbb9d1a27f2a30613a27172dbb1dad5bf4a4fbd1235b198d45d8137f30f09a76a4e9a9520d4e9001e07f9f5238b1e9020cd488