Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
bf143fe348808dcdee7ae030099d4130N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf143fe348808dcdee7ae030099d4130N.exe
Resource
win10v2004-20240802-en
General
-
Target
bf143fe348808dcdee7ae030099d4130N.exe
-
Size
35KB
-
MD5
bf143fe348808dcdee7ae030099d4130
-
SHA1
3f80ce5a11ff26f7cb6479fcdeb85c833f079570
-
SHA256
31b051415738aa141d21b6849b1021021bab1d51bc97cbbb1affc20b19a9eb98
-
SHA512
25e159d4f8cc55c3902406161695d29876f76e1d7dfdeaba3a4b8209693adb0bf674cd3d9cca846562f5d0e7c8a8b0be6acfc93d95a51a79b831ee6ca0f99659
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Emkcb:e6q10k0EFjed6rqJ+6vghzwYu7vih9G2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4000 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4000 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" bf143fe348808dcdee7ae030099d4130N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe bf143fe348808dcdee7ae030099d4130N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf143fe348808dcdee7ae030099d4130N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4000 2176 bf143fe348808dcdee7ae030099d4130N.exe 84 PID 2176 wrote to memory of 4000 2176 bf143fe348808dcdee7ae030099d4130N.exe 84 PID 2176 wrote to memory of 4000 2176 bf143fe348808dcdee7ae030099d4130N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf143fe348808dcdee7ae030099d4130N.exe"C:\Users\Admin\AppData\Local\Temp\bf143fe348808dcdee7ae030099d4130N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD52b428e70ace4cdbcf57bba61ab99d72d
SHA1ff5b28f2483d1aefb6b55f7298f33a9244bc1c88
SHA25684b824fb5798e5deb63ea1d2c76a790d32d2a2385a52e4f79c001a1336509df0
SHA5123fb664a68f0ec1fbb82d42977b789f5d46277a1723df8f941289dd652d40ae1e7890d68761aaffb3c7cce39bca3697b9e23ad598068aab60519eac18011cafa6