Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 07:11
Static task
static1
Behavioral task
behavioral1
Sample
af0323f8b23c13e4b45f8f58c159d220N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af0323f8b23c13e4b45f8f58c159d220N.exe
Resource
win10v2004-20240802-en
General
-
Target
af0323f8b23c13e4b45f8f58c159d220N.exe
-
Size
36KB
-
MD5
af0323f8b23c13e4b45f8f58c159d220
-
SHA1
9003f080f2d8fc23ae081925a37cb8d6ee4c6c69
-
SHA256
61d495459085cb4f08f3cf21ab481fa31de3e0300aab68df790e8e797649f334
-
SHA512
e66e34fdc389e9f4bf718f6993bb340beab915be4b33e6b6f0587218ff1a2fc2c79a651f84fb40ae1188c088449da7fc2252ecd811d6f0fe94d76a0d7fe6a206
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6Ij:e6q10k0EFjed6rqJ+6vghzwYu7vih9G/
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2564 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" af0323f8b23c13e4b45f8f58c159d220N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe af0323f8b23c13e4b45f8f58c159d220N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af0323f8b23c13e4b45f8f58c159d220N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2564 1444 af0323f8b23c13e4b45f8f58c159d220N.exe 91 PID 1444 wrote to memory of 2564 1444 af0323f8b23c13e4b45f8f58c159d220N.exe 91 PID 1444 wrote to memory of 2564 1444 af0323f8b23c13e4b45f8f58c159d220N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\af0323f8b23c13e4b45f8f58c159d220N.exe"C:\Users\Admin\AppData\Local\Temp\af0323f8b23c13e4b45f8f58c159d220N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4340,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD505a49b0d11527686dd191e0ccf9b6ee8
SHA1dfc551a949f52badad37394a8d936efd84504484
SHA256e4188d81e2f41ae57353c4ff152ee4174349882f2afa9da1eb6f0c6f1f6e43ec
SHA512d1ac7e61d6b8abc8059012feda738a7dbef9e84ac169960c4c7fa0a0723c1a8a0c7a76ef10193b22fbd09614c517dde0cf64623eaa379e069702e8de263141ea