Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
123bf59fff7d53eb90be9cd79ba08450N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
123bf59fff7d53eb90be9cd79ba08450N.exe
Resource
win10v2004-20240802-en
General
-
Target
123bf59fff7d53eb90be9cd79ba08450N.exe
-
Size
37KB
-
MD5
123bf59fff7d53eb90be9cd79ba08450
-
SHA1
6244527b65ec10d8c4d62b3b970f04444cc0379e
-
SHA256
8a46b06680ff5767aa24d6fea40549ad0b8359e7aeed89cf17b3dac91abebe88
-
SHA512
551e280db3ebaba05ccedf245108a0b55e097ab8173cc11a8331a372ae3a209469df860afaac0685d34a6e1e400ba0ff2049e9e804a7081a8e7f5c3090a39738
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/3:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2156 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2156 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 123bf59fff7d53eb90be9cd79ba08450N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 123bf59fff7d53eb90be9cd79ba08450N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123bf59fff7d53eb90be9cd79ba08450N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2156 2444 123bf59fff7d53eb90be9cd79ba08450N.exe 30 PID 2444 wrote to memory of 2156 2444 123bf59fff7d53eb90be9cd79ba08450N.exe 30 PID 2444 wrote to memory of 2156 2444 123bf59fff7d53eb90be9cd79ba08450N.exe 30 PID 2444 wrote to memory of 2156 2444 123bf59fff7d53eb90be9cd79ba08450N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\123bf59fff7d53eb90be9cd79ba08450N.exe"C:\Users\Admin\AppData\Local\Temp\123bf59fff7d53eb90be9cd79ba08450N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5e72c6448c46c215979a74c655ca22601
SHA17b57d72c8d2c3b610065f1e3ffd4f2743b03385e
SHA256128bc2c9f4e07141a2bcc9f30a3f39d65d5bfd5dd1a29606f1f6585ca3fd773a
SHA512d9dbb3d80f1e785a5f095265b3ec1f975a250a5352cd5c64d647f7739a033afb9147da1e824f400b405648917f1eb5bf05f30feb1737f590d22ef8139452973a