Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 15:56
Static task
static1
Behavioral task
behavioral1
Sample
ca56a6914bc6d52934c9008faf02a9f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ca56a6914bc6d52934c9008faf02a9f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ca56a6914bc6d52934c9008faf02a9f0N.exe
-
Size
61KB
-
MD5
ca56a6914bc6d52934c9008faf02a9f0
-
SHA1
5765a87381ec543aa3da728a1f7da5fe2fb58efa
-
SHA256
e4d25d44f59a478409712e60a82c6fe1b0c36bd07ebbbd257040f3eceafe62fa
-
SHA512
8b8430f804df7a10266a84a67887f18cdfe3a7920fadd7f30cc470fc2c3645d64e847544c879d424ec621dcc9a053e3025edfc3d83b57bec8524651b847204ee
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbIKjhvFhBhd:NAoglOwvl4ulkP6vghzwYu7vih9GueIa
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 412 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 412 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" ca56a6914bc6d52934c9008faf02a9f0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe ca56a6914bc6d52934c9008faf02a9f0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca56a6914bc6d52934c9008faf02a9f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3456 wrote to memory of 412 3456 ca56a6914bc6d52934c9008faf02a9f0N.exe 86 PID 3456 wrote to memory of 412 3456 ca56a6914bc6d52934c9008faf02a9f0N.exe 86 PID 3456 wrote to memory of 412 3456 ca56a6914bc6d52934c9008faf02a9f0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca56a6914bc6d52934c9008faf02a9f0N.exe"C:\Users\Admin\AppData\Local\Temp\ca56a6914bc6d52934c9008faf02a9f0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e3a649723c94043a92cf0dcc0bd3b207
SHA1a834a5fda2c87d33fdc538fec697f1053ed659ab
SHA25605640e61454f7365a5f207abf4ab448c9cd5f2c854e73f2acfd49c47a4c50500
SHA512d630e910bd6f59be726657717361658ca0d7582de6f9bc2f5a5b71e728dac3e8026259494b410c2eafda81579f1fb367245e2e6dc16356f23d28d7ceacaccd41