Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
1d5b9d72ceb4683e93b12c3cedfb55c0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1d5b9d72ceb4683e93b12c3cedfb55c0N.exe
Resource
win10v2004-20240802-en
General
-
Target
1d5b9d72ceb4683e93b12c3cedfb55c0N.exe
-
Size
37KB
-
MD5
1d5b9d72ceb4683e93b12c3cedfb55c0
-
SHA1
ca3f08c9d00d8f06602f9496b00685fd774e1fe8
-
SHA256
e71663b12c7dd298bff6c22b70da027bebaba05175b6c1497c238eaa62e28454
-
SHA512
eef84ac57f83eabffd10093a29a00fbc7058d451deb0ff5e3520309390e108ca4ba63d1d1e8d69a3f8a2afabf91de15e76ffc34c0abf7e489a8050c0e56db67b
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Emkcw:e6q10k0EFjed6rqJ+6vghzwYu7vih9GN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2792 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2792 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 1d5b9d72ceb4683e93b12c3cedfb55c0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 1d5b9d72ceb4683e93b12c3cedfb55c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d5b9d72ceb4683e93b12c3cedfb55c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2792 1064 1d5b9d72ceb4683e93b12c3cedfb55c0N.exe 30 PID 1064 wrote to memory of 2792 1064 1d5b9d72ceb4683e93b12c3cedfb55c0N.exe 30 PID 1064 wrote to memory of 2792 1064 1d5b9d72ceb4683e93b12c3cedfb55c0N.exe 30 PID 1064 wrote to memory of 2792 1064 1d5b9d72ceb4683e93b12c3cedfb55c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d5b9d72ceb4683e93b12c3cedfb55c0N.exe"C:\Users\Admin\AppData\Local\Temp\1d5b9d72ceb4683e93b12c3cedfb55c0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD55fe7ef8416e341dfbcec7e5110284bd9
SHA1a5bbfe423f8977ee4e6db0ba901b4fb85a400973
SHA2563fde0575c0d0e9ec792dda0f57669bdfc6ee7145e91f304df230e84dcf712f98
SHA51219cde0469e3c15c73128261f31a52ada4d53bb9ea1e78288457f4c4a437c50498501b549395248d1b9134ab8e60bfa7b4a7e2822e422b55025cf94bc60da48b9