Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
97857b1e81af40849908d90d31b9cf10N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
97857b1e81af40849908d90d31b9cf10N.exe
Resource
win10v2004-20240802-en
General
-
Target
97857b1e81af40849908d90d31b9cf10N.exe
-
Size
36KB
-
MD5
97857b1e81af40849908d90d31b9cf10
-
SHA1
1825f40f8e9d1df366fd1755372b4fb5738191be
-
SHA256
8841fec0bc44d3bfe32cbad042766e878feef6b5246ea356e087de2887f0aeef
-
SHA512
a663948c0a656b709630a2cd82f7fe06f738957aa79ca845236cf3f718a29660967d65e6191e43b78a63814d1c3f74336d6dbb706c4fa7c8ec904b8ca39dc15a
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6v8tvGE9UHrSdghj8bvHRIkhbUIchUh84:e6q10k0EFjed6rqJ+6v8tvGE9UHrSdgO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2488 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2488 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 97857b1e81af40849908d90d31b9cf10N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 97857b1e81af40849908d90d31b9cf10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97857b1e81af40849908d90d31b9cf10N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2488 1540 97857b1e81af40849908d90d31b9cf10N.exe 30 PID 1540 wrote to memory of 2488 1540 97857b1e81af40849908d90d31b9cf10N.exe 30 PID 1540 wrote to memory of 2488 1540 97857b1e81af40849908d90d31b9cf10N.exe 30 PID 1540 wrote to memory of 2488 1540 97857b1e81af40849908d90d31b9cf10N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\97857b1e81af40849908d90d31b9cf10N.exe"C:\Users\Admin\AppData\Local\Temp\97857b1e81af40849908d90d31b9cf10N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5dfef926cd96232a7848ac3fd6de9cefe
SHA18bd49aca1ef651b3774881d88163f58f7d4b9a12
SHA256668aae8bee3351851929c8b0903a05fd547ee43b3de9e2ae180accfa800377bb
SHA51214bd42aaf7b09fb3981c531322ce480fbaab1408d9817be2b109cfbb201ec2dc135ab99c2246ff95ecfff9b1dca3db7e8a736a78cb9744eb1d100458eff2dce6