Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-08-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
7fc2a2268538289a0a4ff921fc335ad0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7fc2a2268538289a0a4ff921fc335ad0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7fc2a2268538289a0a4ff921fc335ad0N.exe
-
Size
37KB
-
MD5
7fc2a2268538289a0a4ff921fc335ad0
-
SHA1
897d40819e24546639e369ae2299197ad00300a6
-
SHA256
bb68cd633a8659d0c83e9d06df2d8bc01981227f8c6205ecbc401b82a4e3fca5
-
SHA512
b47a4cd8dc61222762e19694fb1283b10aaf87e693301e0e423ff9fa7a71dd160ba06a56e47e5563de8b5d38e38425c3f246e9beea22cef2cab2eff6d7c497d5
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6v8tvGE9UHrSdghj8bvHRIkhbUIchUh80:e6q10k0EFjed6rqJ+6v8tvGE9UHrSdgK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2828 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 7fc2a2268538289a0a4ff921fc335ad0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 7fc2a2268538289a0a4ff921fc335ad0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fc2a2268538289a0a4ff921fc335ad0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2828 1752 7fc2a2268538289a0a4ff921fc335ad0N.exe 29 PID 1752 wrote to memory of 2828 1752 7fc2a2268538289a0a4ff921fc335ad0N.exe 29 PID 1752 wrote to memory of 2828 1752 7fc2a2268538289a0a4ff921fc335ad0N.exe 29 PID 1752 wrote to memory of 2828 1752 7fc2a2268538289a0a4ff921fc335ad0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fc2a2268538289a0a4ff921fc335ad0N.exe"C:\Users\Admin\AppData\Local\Temp\7fc2a2268538289a0a4ff921fc335ad0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2828
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD56ad22628fff04ba5dd2ea9137465a7de
SHA1973132c77853c70ec6ad9a823981c8434b2668f5
SHA25609da746b92df19ee7533ed23b18e1d3113de523c7038e6ddd3abc6486f122cc1
SHA51279037caab1de23066e50aabffb5f50de07a2deb44ff11223b105f8c905bc6d29d38c6097ac92849eaa60810962e3d65fcd96bee973d69b6f2c3bb0db3d05c154