Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
694aa65fab7fe79135322680c6b6c350N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
694aa65fab7fe79135322680c6b6c350N.exe
Resource
win10v2004-20240802-en
General
-
Target
694aa65fab7fe79135322680c6b6c350N.exe
-
Size
76KB
-
MD5
694aa65fab7fe79135322680c6b6c350
-
SHA1
1cc1704eb7af89a41a5f1135e0fa4c57d281ee97
-
SHA256
a99a5cd6b702aa387242da8fd67140962927b5c04b30dba4c23fa6b7a2183c32
-
SHA512
5039c4c457d0225d625b9f1aa842e057b07ab2ba7c5e86c8c6bc80f519c07900459ced755854e209fdb2f8e87dd7ec62ee9dd3c033dd09e824f924a23ba9ac31
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvPHG3GvUhCHi1X5GoOvmHOo:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4572 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4572 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 694aa65fab7fe79135322680c6b6c350N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 694aa65fab7fe79135322680c6b6c350N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 694aa65fab7fe79135322680c6b6c350N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2328 wrote to memory of 4572 2328 694aa65fab7fe79135322680c6b6c350N.exe 91 PID 2328 wrote to memory of 4572 2328 694aa65fab7fe79135322680c6b6c350N.exe 91 PID 2328 wrote to memory of 4572 2328 694aa65fab7fe79135322680c6b6c350N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\694aa65fab7fe79135322680c6b6c350N.exe"C:\Users\Admin\AppData\Local\Temp\694aa65fab7fe79135322680c6b6c350N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4128,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:81⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5c1a709370d56f75732b24a690a7405ed
SHA1896a2782ea5c2cc5436116cc8a7d9158bc5d8f3f
SHA25690bdd13a705c8d59b09066ca2a704fa32826e7b02d6934972a3c086e8bdf645c
SHA5129a76848f85720a43dd9416539f8efcd9d35271c251b414aabb51f4250f9491307188ae62805d5d821dbf80c2ae6db2ae8eb99912cf6d0c8c0ae0190b75a090d2