Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
f9e211ac1aecd7e2be28bbe711c42b50N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f9e211ac1aecd7e2be28bbe711c42b50N.exe
Resource
win10v2004-20240802-en
General
-
Target
f9e211ac1aecd7e2be28bbe711c42b50N.exe
-
Size
39KB
-
MD5
f9e211ac1aecd7e2be28bbe711c42b50
-
SHA1
73a932a7f0fa439cd93a317ba0c11452b3bf62e1
-
SHA256
e79416dfe20dac25df8866665c04761fc3b963bfb7e1f63292f2c7886c3dfd2f
-
SHA512
a7ac096fbf40610ec2fcb251c5744a22c22dca79aa168bdfb0a3cb6a814cf4732df05d29326dcfc2779409ce1483e17227f28128dfb878aabf1adac342e0cf47
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6Ir:e6q10k0EFjed6rqJ+6vghzwYu7vih9GP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2092 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2092 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" f9e211ac1aecd7e2be28bbe711c42b50N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe f9e211ac1aecd7e2be28bbe711c42b50N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9e211ac1aecd7e2be28bbe711c42b50N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2092 2552 f9e211ac1aecd7e2be28bbe711c42b50N.exe 30 PID 2552 wrote to memory of 2092 2552 f9e211ac1aecd7e2be28bbe711c42b50N.exe 30 PID 2552 wrote to memory of 2092 2552 f9e211ac1aecd7e2be28bbe711c42b50N.exe 30 PID 2552 wrote to memory of 2092 2552 f9e211ac1aecd7e2be28bbe711c42b50N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9e211ac1aecd7e2be28bbe711c42b50N.exe"C:\Users\Admin\AppData\Local\Temp\f9e211ac1aecd7e2be28bbe711c42b50N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD58847e659b2f498dfa073496a3bc0f6a6
SHA14ecfc47ff9ca27601c8f3335f5a2c20eaf179d36
SHA256cf091b5c26f48fcd2c65e3d639d5d42a4eb2c6df252144c765017189a41553b5
SHA512c86107ac1fe0ae20d112272db303f685e8d82947084c41dbc08055b050c37a2910b51f2f6f1b33e346eedd457a4135cf351883fd5046bce119b8b24714008333