Analysis
-
max time kernel
119s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 06:14
Static task
static1
Behavioral task
behavioral1
Sample
2fd01e78f1d3f283a78af00dcecc5100N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2fd01e78f1d3f283a78af00dcecc5100N.exe
Resource
win10v2004-20240802-en
General
-
Target
2fd01e78f1d3f283a78af00dcecc5100N.exe
-
Size
61KB
-
MD5
2fd01e78f1d3f283a78af00dcecc5100
-
SHA1
56a06c2c64bbcd8e53b4f2a84e0cf6e09386e296
-
SHA256
2647a3dd2a400661c91a1a3204e72cd5ce83eb431ff60d85f2aa5535e51fdc12
-
SHA512
9fd1c7be929e414edac6c1763e8b034e4a9df1682b18dda83ee1c55f99911c009469cf2316811caa5221faa1e185cb9ce04aa6ee741f59da254a3d24db170dee
-
SSDEEP
1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAcBHUIFvSHbhqhJIFv:lAo1lOwvlKlXBP6vghzwYu7vih9GueI9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2844 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 2fd01e78f1d3f283a78af00dcecc5100N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 2fd01e78f1d3f283a78af00dcecc5100N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fd01e78f1d3f283a78af00dcecc5100N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2844 2652 2fd01e78f1d3f283a78af00dcecc5100N.exe 30 PID 2652 wrote to memory of 2844 2652 2fd01e78f1d3f283a78af00dcecc5100N.exe 30 PID 2652 wrote to memory of 2844 2652 2fd01e78f1d3f283a78af00dcecc5100N.exe 30 PID 2652 wrote to memory of 2844 2652 2fd01e78f1d3f283a78af00dcecc5100N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fd01e78f1d3f283a78af00dcecc5100N.exe"C:\Users\Admin\AppData\Local\Temp\2fd01e78f1d3f283a78af00dcecc5100N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5d40c7f6d43c2c73b5ec63f99e56d75b5
SHA159c9dcf7288c15c9327ab00237c9110d8d406d83
SHA256ebd2861bff0ed9c1dfeb7f61546bdf314002036a25ae351c4bcd372be89dc586
SHA512b79a64dd7562d7be63b370b5f2ae7f8870b063972e526d46d29d422e3c0ed2c3f6e7ac4a6dd7beb0becb1f684300d6ef1d588e5510a42b620ce9ca243e1fcd40