Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
66a0845cbaa065ba76c5020069e9bca0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66a0845cbaa065ba76c5020069e9bca0N.exe
Resource
win10v2004-20240802-en
General
-
Target
66a0845cbaa065ba76c5020069e9bca0N.exe
-
Size
63KB
-
MD5
66a0845cbaa065ba76c5020069e9bca0
-
SHA1
ee6b237c046083d3e7ca8a192c2726275d3f0d6c
-
SHA256
2f7557b061d891004ac34a76fb70a3b261b57dabed6127c6d479daf71f9e4456
-
SHA512
1e3a7f4b92a27e91da81bbe89102efe84c8b94f950c8df95d47010a872923542de31bc515e58f3d2fc818fc40aed9946e0fedb41302eb73167f1692b347ae411
-
SSDEEP
1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAjU+EmkcU+uZd7ZYhl:lAo1lOwvlKlXBP6vghzwYu7vih9GueIb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2700 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2700 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 66a0845cbaa065ba76c5020069e9bca0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 66a0845cbaa065ba76c5020069e9bca0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66a0845cbaa065ba76c5020069e9bca0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2700 3012 66a0845cbaa065ba76c5020069e9bca0N.exe 84 PID 3012 wrote to memory of 2700 3012 66a0845cbaa065ba76c5020069e9bca0N.exe 84 PID 3012 wrote to memory of 2700 3012 66a0845cbaa065ba76c5020069e9bca0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a0845cbaa065ba76c5020069e9bca0N.exe"C:\Users\Admin\AppData\Local\Temp\66a0845cbaa065ba76c5020069e9bca0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD57c822c07c6070c9be4f880a9d84f7598
SHA1ca4f7a75457d7ee1d9dbc29399a32a3dd54f3281
SHA2565902eafb5832b5bdf3b42150338e8e8c77fb41ac50cc92ebccee5cc0b06b84ce
SHA5124e8e6d93346f0cc0246bc375adf6253621ce73c0cbb635a8edf4a009da6b1e5dca88246b0c8323284342762f304d1ce2f7048251e78cc03db3263917cd42fd27