Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
69178fd5bd5c912d26dc5adae86be9e0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
69178fd5bd5c912d26dc5adae86be9e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
69178fd5bd5c912d26dc5adae86be9e0N.exe
-
Size
75KB
-
MD5
69178fd5bd5c912d26dc5adae86be9e0
-
SHA1
9099364a533ef6403522a528928b8835c0590f43
-
SHA256
764a975375416d769e3f8e50bb0183f4b858ae5ab8759885375fd462155355ee
-
SHA512
ab15a15bd28ed433eae3939730b6a5163547330fabb736021ebd1ea3b71b721acd6000056f78a208747956b9ec078e1883dcdf96eec4db0926060eed17646c9d
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCIzhUvTc:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhA6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2680 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2680 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 69178fd5bd5c912d26dc5adae86be9e0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 69178fd5bd5c912d26dc5adae86be9e0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69178fd5bd5c912d26dc5adae86be9e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2680 1544 69178fd5bd5c912d26dc5adae86be9e0N.exe 31 PID 1544 wrote to memory of 2680 1544 69178fd5bd5c912d26dc5adae86be9e0N.exe 31 PID 1544 wrote to memory of 2680 1544 69178fd5bd5c912d26dc5adae86be9e0N.exe 31 PID 1544 wrote to memory of 2680 1544 69178fd5bd5c912d26dc5adae86be9e0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\69178fd5bd5c912d26dc5adae86be9e0N.exe"C:\Users\Admin\AppData\Local\Temp\69178fd5bd5c912d26dc5adae86be9e0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5637709661afe6d6cf81f5f7e5d73105c
SHA1df763d88a29b4376bc5ba7538146536d00db9828
SHA256715fd3a419a5cf48aab55ccd3bfa01af3444e87b23706de84b4e5c3c037ae9ab
SHA51237285d7f4755c9948c9b949b29f2b6d5c68b21a91694e2cf57aae6823b1cf01683b2a7ea4cff73c1dc9587ac53c935c4ba842d3f102dec2d69ae909b41c5a8d0