Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
bb3829b8b325af7e5fd8b8382222f3f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bb3829b8b325af7e5fd8b8382222f3f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
bb3829b8b325af7e5fd8b8382222f3f0N.exe
-
Size
37KB
-
MD5
bb3829b8b325af7e5fd8b8382222f3f0
-
SHA1
ba54774b9453f29dc0435e62596f454bc1f7dbcf
-
SHA256
9e2f1507f2e6810573f563f2b304844b561d6c8f927d5f63d3ca28ed21d758f6
-
SHA512
a36323bdf431300bccb2eaa799b1bc4b9142d5f0f994f1460612c31fd0a88b7f546694343b2c11440f05daba0eae325d18cc9cfad6383051333b7b6c48d001aa
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6v8tvGE9UHrSdghj8bvHRIkhbUIchUh8F:e6q10k0EFjed6rqJ+6v8tvGE9UHrSdgD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4104 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4104 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" bb3829b8b325af7e5fd8b8382222f3f0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe bb3829b8b325af7e5fd8b8382222f3f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb3829b8b325af7e5fd8b8382222f3f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4632 wrote to memory of 4104 4632 bb3829b8b325af7e5fd8b8382222f3f0N.exe 91 PID 4632 wrote to memory of 4104 4632 bb3829b8b325af7e5fd8b8382222f3f0N.exe 91 PID 4632 wrote to memory of 4104 4632 bb3829b8b325af7e5fd8b8382222f3f0N.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb3829b8b325af7e5fd8b8382222f3f0N.exe"C:\Users\Admin\AppData\Local\Temp\bb3829b8b325af7e5fd8b8382222f3f0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4156,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4056 /prefetch:81⤵PID:1828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD56f0ae008f41b4c6b879e890523e63cc1
SHA19eedca96852019cdb5d3155494dc33de7d0b869d
SHA25677934297cb4ad26b8488d7fc190207e59f3452ddaff82cf056b983746eab4696
SHA5122fb5dfc9abe8f92caaad711d059a8012737be420552cae966d1fa44acfafb46bdc5da93a88338c5325e1cf87dd314420d0ad566cb21f1ad9eea0adb0caf3e13f