Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
badc756ef51cff9be2f8c159b0f3f0c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
badc756ef51cff9be2f8c159b0f3f0c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
badc756ef51cff9be2f8c159b0f3f0c0N.exe
-
Size
74KB
-
MD5
badc756ef51cff9be2f8c159b0f3f0c0
-
SHA1
e36d25dc7ce19e085a2e17ad2d76fbb200703f27
-
SHA256
5cf9db8dec175b1c6e2386575a9fe4656c7e6f963242db288f860c309e8a6863
-
SHA512
a09e7b7222bd9d087e3f1c75192c6eb533197af3b29ed6f325b04af87d9f18174cdbb57d494b0c946618680d7dee850b8a9d365eb1b2e9321d7fe5ae4a6c7fcb
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCIzhUvT/:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAF
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 676 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 676 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" badc756ef51cff9be2f8c159b0f3f0c0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe badc756ef51cff9be2f8c159b0f3f0c0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language badc756ef51cff9be2f8c159b0f3f0c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 676 2528 badc756ef51cff9be2f8c159b0f3f0c0N.exe 30 PID 2528 wrote to memory of 676 2528 badc756ef51cff9be2f8c159b0f3f0c0N.exe 30 PID 2528 wrote to memory of 676 2528 badc756ef51cff9be2f8c159b0f3f0c0N.exe 30 PID 2528 wrote to memory of 676 2528 badc756ef51cff9be2f8c159b0f3f0c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\badc756ef51cff9be2f8c159b0f3f0c0N.exe"C:\Users\Admin\AppData\Local\Temp\badc756ef51cff9be2f8c159b0f3f0c0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5b525fe55fa4f79c1042866560faad03d
SHA1f338dcbc741584e04fa80dcc2d15bbf715e55e74
SHA256c33586dbfa78ba07706db605d9b3e5f12547e8ce964932e08faf3ff16047b699
SHA51205659fb99f56e3f6739f8ebd36a7ef89ae1174d31c6885f78b8687a0f98ec23a524327b079715824441557b9b874d09525bf6b10cf667b2ab282a5d29501fe94