Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
eaa4ecd9411a09d873ddd65f9bc9af00N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
eaa4ecd9411a09d873ddd65f9bc9af00N.exe
Resource
win10v2004-20240802-en
General
-
Target
eaa4ecd9411a09d873ddd65f9bc9af00N.exe
-
Size
37KB
-
MD5
eaa4ecd9411a09d873ddd65f9bc9af00
-
SHA1
8963cadf29cbaa88d6e748cfe108f0832166cb56
-
SHA256
b81b730a806fbf4f2a238c9893e6722ac037c16fb14dca9a54eb73180dfa1d28
-
SHA512
1f5c5c9a3b455aa48b75d17c40771c08d4e8811e4289f220c17d9ecf7a77b7153440a4a1cf7109f0787318a3b3e289b291e534799fd75772506127a4673f33a0
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6Ie:e6q10k0EFjed6rqJ+6vghzwYu7vih9GC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1160 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1160 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" eaa4ecd9411a09d873ddd65f9bc9af00N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe eaa4ecd9411a09d873ddd65f9bc9af00N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa4ecd9411a09d873ddd65f9bc9af00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1160 2032 eaa4ecd9411a09d873ddd65f9bc9af00N.exe 84 PID 2032 wrote to memory of 1160 2032 eaa4ecd9411a09d873ddd65f9bc9af00N.exe 84 PID 2032 wrote to memory of 1160 2032 eaa4ecd9411a09d873ddd65f9bc9af00N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa4ecd9411a09d873ddd65f9bc9af00N.exe"C:\Users\Admin\AppData\Local\Temp\eaa4ecd9411a09d873ddd65f9bc9af00N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD50ec26ede6b3de6cf93afd970da4e27e0
SHA133e7b3b8b5432d65e9569387c0c23e530363f6af
SHA2566edda5184f0a3bacf0be026b293872c8c7553627790a92d7bb22f16cbca50bcc
SHA5126a745c67b28713c28f96165f43960e22b464836325f9622152b1f60a2d83fce2d8a7610c4e2c62bf6ba0437baa1b3e1ef9647b1fd7fcc1473589e08938a2a684