Analysis
-
max time kernel
120s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 15:46
Static task
static1
Behavioral task
behavioral1
Sample
a436ecc4eeb10e10549a1835fbb11130N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a436ecc4eeb10e10549a1835fbb11130N.exe
Resource
win10v2004-20240802-en
General
-
Target
a436ecc4eeb10e10549a1835fbb11130N.exe
-
Size
37KB
-
MD5
a436ecc4eeb10e10549a1835fbb11130
-
SHA1
bd94a4ba58f11aede4b9e61f7955b2d615dbcb5b
-
SHA256
e0e905e6534ad30c6cc15628044b5a713e2887cde09fb6efb9f6d4d7043876f0
-
SHA512
10f93cacc4ad071af0592c4272a3f9fa3692dcedf14b247f14a6857542d10166196997eaca646de103bb0ec6bb167498f89579bd3148278050b99347109140c2
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6Iq:e6q10k0EFjed6rqJ+6vghzwYu7vih9GW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2160 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2160 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" a436ecc4eeb10e10549a1835fbb11130N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe a436ecc4eeb10e10549a1835fbb11130N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a436ecc4eeb10e10549a1835fbb11130N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2160 1900 a436ecc4eeb10e10549a1835fbb11130N.exe 30 PID 1900 wrote to memory of 2160 1900 a436ecc4eeb10e10549a1835fbb11130N.exe 30 PID 1900 wrote to memory of 2160 1900 a436ecc4eeb10e10549a1835fbb11130N.exe 30 PID 1900 wrote to memory of 2160 1900 a436ecc4eeb10e10549a1835fbb11130N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a436ecc4eeb10e10549a1835fbb11130N.exe"C:\Users\Admin\AppData\Local\Temp\a436ecc4eeb10e10549a1835fbb11130N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD540028282d45ff492bfa16cd6dda29f65
SHA13825c22b313ee3c8fcbe6c8311fefd46c448f6ed
SHA256b533b44160df65a4f615a0d87c752d15b19915b17108540a332d362e2c5b4ad4
SHA512181dc5a79075483f74dfd961b008c4d500d3c27ba36010ac7a2c33bd54533558ccb406297b2d70ee448d972fc8458a8664d151451b8d10cc8e01cab377110420