Analysis
-
max time kernel
119s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
f17593179f37533c8a5e2f694ad70920N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f17593179f37533c8a5e2f694ad70920N.exe
Resource
win10v2004-20240802-en
General
-
Target
f17593179f37533c8a5e2f694ad70920N.exe
-
Size
37KB
-
MD5
f17593179f37533c8a5e2f694ad70920
-
SHA1
f80b54531e0b38466d00f6f99f81713fc20d57f2
-
SHA256
aa32e7bb5a51454bb069ab400e7ad0a4701497546156d1af42ba454468da0819
-
SHA512
84e3bc3adddc17bc4f8d8a4bfa338b511af01d6345448dab0193ea1414f32b301ee3177ca365c485a24a87d5bb58253614982bf454504db4a6aa624b64e81877
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IX:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gb
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 444 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 444 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" f17593179f37533c8a5e2f694ad70920N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe f17593179f37533c8a5e2f694ad70920N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f17593179f37533c8a5e2f694ad70920N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2380 wrote to memory of 444 2380 f17593179f37533c8a5e2f694ad70920N.exe 84 PID 2380 wrote to memory of 444 2380 f17593179f37533c8a5e2f694ad70920N.exe 84 PID 2380 wrote to memory of 444 2380 f17593179f37533c8a5e2f694ad70920N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f17593179f37533c8a5e2f694ad70920N.exe"C:\Users\Admin\AppData\Local\Temp\f17593179f37533c8a5e2f694ad70920N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD51f06537665e9bd4014cdf44f6d64dc28
SHA1631dcdb5fce07a90e73e469e631537ec3f3318fe
SHA2560bc2c5e62516954cad3946b141215dc4c7ddfca84599bcb9fe283f0674c5d8d0
SHA512d1a22a5c981efa4a0a25204d9a8ac18c4003427435624934ca25880974b8f71de66dbfb31b98b8847fd1fbf29009a5218100eec11e8269ec7f3040a40d7a6ba0