Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 20:12
Static task
static1
Behavioral task
behavioral1
Sample
7b5af434ac57300d51cf0e83b43c40d0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7b5af434ac57300d51cf0e83b43c40d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
7b5af434ac57300d51cf0e83b43c40d0N.exe
-
Size
62KB
-
MD5
7b5af434ac57300d51cf0e83b43c40d0
-
SHA1
5d708df7421bd0370b474f2985a63a8c48a73324
-
SHA256
e7622b27a53ac2215f35d6882c93a514620f7d3571ddd7b02cb674a48cb7f02b
-
SHA512
e2df29e80b3d0ca2d5e147052a1ebb59be372b3a54121d8d754e455198698daac02241a74037607ee0501207802126db090402dc45b3eefd0f32b6abbc9c7397
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbIKv8hDhWhh:NAoglOwvl4ulkP6vghzwYu7vih9GueIU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1504 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1504 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 7b5af434ac57300d51cf0e83b43c40d0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 7b5af434ac57300d51cf0e83b43c40d0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b5af434ac57300d51cf0e83b43c40d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5084 wrote to memory of 1504 5084 7b5af434ac57300d51cf0e83b43c40d0N.exe 83 PID 5084 wrote to memory of 1504 5084 7b5af434ac57300d51cf0e83b43c40d0N.exe 83 PID 5084 wrote to memory of 1504 5084 7b5af434ac57300d51cf0e83b43c40d0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b5af434ac57300d51cf0e83b43c40d0N.exe"C:\Users\Admin\AppData\Local\Temp\7b5af434ac57300d51cf0e83b43c40d0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD50f5cc93d52a381e5862e6a69bf878649
SHA13ed7815dc00546b38c7e2774b775cf411464953a
SHA2565bfb16b2818e8daa9baf61f113c2da22ac4b4a10b947dce8ed33f9c2b3e5f6e1
SHA5124fbf00e59487151dc7675ffe7b9c29b7ec6852544c4eb72ba91ab3585d777086d6284919953c5ce5537ba258d7f01d36d3cc6240ce0048ffc5450b2bcd7b7e9d