Analysis
-
max time kernel
120s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
63e8f467da609801db378e268b696eb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
63e8f467da609801db378e268b696eb0N.exe
Resource
win10v2004-20240802-en
General
-
Target
63e8f467da609801db378e268b696eb0N.exe
-
Size
40KB
-
MD5
63e8f467da609801db378e268b696eb0
-
SHA1
0805427d8b107978c31b348abd34b6d79b6add1e
-
SHA256
53e0c1f59d2cb60aa8aeb19fa4d67719e61388e655546d686917ade75ac2ceed
-
SHA512
ebaa6f0ef58897d26d092bce3d4433ee06d3718612a2f48c9d84189f24208fadba5e23effc6399ee9c5d457f6ee0c1a2000c0302a4628cc0d5798cbb37428bb3
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAcBHUIF2f:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4548 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4548 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 63e8f467da609801db378e268b696eb0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 63e8f467da609801db378e268b696eb0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63e8f467da609801db378e268b696eb0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4548 3228 63e8f467da609801db378e268b696eb0N.exe 84 PID 3228 wrote to memory of 4548 3228 63e8f467da609801db378e268b696eb0N.exe 84 PID 3228 wrote to memory of 4548 3228 63e8f467da609801db378e268b696eb0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\63e8f467da609801db378e268b696eb0N.exe"C:\Users\Admin\AppData\Local\Temp\63e8f467da609801db378e268b696eb0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5181ad785074c3334fb499ea2b8e72fd2
SHA10f74167e1b29f8ede6d9ff0eceee39cb0fd904db
SHA256283b6280d29a8a9d958ddff18994873db95fa86aa58f4669bc1f24b9c7ce6a10
SHA512bdcd6a9b2a951c92ec558b40929d50b4f50e6995ead0f89a73ef8470e7fcf6dce870986a78645cdf9661c0cb9eae7988e109ddfe09c4b686a491460f6459628b