Analysis
-
max time kernel
119s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
c247aa0714272f8e80dd7380a8949be0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c247aa0714272f8e80dd7380a8949be0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c247aa0714272f8e80dd7380a8949be0N.exe
-
Size
77KB
-
MD5
c247aa0714272f8e80dd7380a8949be0
-
SHA1
b63f01add964b67cd8a55c74ed580648005bd4db
-
SHA256
cec2b133f40b7e034b0a1c80e4a53a10534bd1ab9047782e42738cb5c7e0d1ad
-
SHA512
44e58083e086195a2d9d634dae9040f90000899e4104441363874fcafe8653fbcbd7c888ef8286363fdf22888a3e37c7f74262bce53584c8ccb41dbdbbb6568d
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OInvnHvvxIfhqhcGoI/V:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1812 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1812 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" c247aa0714272f8e80dd7380a8949be0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe c247aa0714272f8e80dd7380a8949be0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c247aa0714272f8e80dd7380a8949be0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1812 3032 c247aa0714272f8e80dd7380a8949be0N.exe 82 PID 3032 wrote to memory of 1812 3032 c247aa0714272f8e80dd7380a8949be0N.exe 82 PID 3032 wrote to memory of 1812 3032 c247aa0714272f8e80dd7380a8949be0N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c247aa0714272f8e80dd7380a8949be0N.exe"C:\Users\Admin\AppData\Local\Temp\c247aa0714272f8e80dd7380a8949be0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD51c873bb3c760322da9dbacb7b1bdc976
SHA19a4754d678eef7812da69b60db268186cb64e894
SHA2567225ca7ab64b8f557cc7645b2e69309da05891ff430d0d37f45dbf8aef8bcdc1
SHA512a485c33ae338832144ab9b5d89cccd54239a1cb2bc468aee93c10ab1b22098fff638390f5b45ba2813fa84e11caa7144a1bb79da467b5ad7e9e22484ab3befb4