Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
85508e89c912584f8d6e4cd14a663c60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
85508e89c912584f8d6e4cd14a663c60N.exe
Resource
win10v2004-20240802-en
General
-
Target
85508e89c912584f8d6e4cd14a663c60N.exe
-
Size
37KB
-
MD5
85508e89c912584f8d6e4cd14a663c60
-
SHA1
5ee1b3ce7de80f6f1e4be3d2fa8d50a5dd976444
-
SHA256
6c73b6e3e6512035e18dbbc24615704af2cb7d147998c5a34535ae54c0aafcd1
-
SHA512
d42fb6ccd3677063a2a8abee7a1fa081c42d4c054da0d00334a6e19f99aef4e338d5b851d06c026d9d7b5157e82692d24011a61699a1a9f50d828454c0cddfeb
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IK:e6q10k0EFjed6rqJ+6vghzwYu7vih9GO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2208 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2208 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 85508e89c912584f8d6e4cd14a663c60N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 85508e89c912584f8d6e4cd14a663c60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85508e89c912584f8d6e4cd14a663c60N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2208 1968 85508e89c912584f8d6e4cd14a663c60N.exe 30 PID 1968 wrote to memory of 2208 1968 85508e89c912584f8d6e4cd14a663c60N.exe 30 PID 1968 wrote to memory of 2208 1968 85508e89c912584f8d6e4cd14a663c60N.exe 30 PID 1968 wrote to memory of 2208 1968 85508e89c912584f8d6e4cd14a663c60N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\85508e89c912584f8d6e4cd14a663c60N.exe"C:\Users\Admin\AppData\Local\Temp\85508e89c912584f8d6e4cd14a663c60N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD565ad371ea7e9c1047aa069898caab471
SHA134abc1b7828b5f620f446868b12d9e2449db8a44
SHA256dc3b51cd2ce7727796526d68979ac61323e7d9265fd818b30824a04313367c5d
SHA512bffa0e55cd4f8c3be80ee999e878708cc52b4c021114eadc8d84ca27ec2e29867c27af509544be1665a683f21f84f564c9530e5afe3568226fbd6375d23510b7