Analysis
-
max time kernel
119s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
ea37856b0268758a43ce5b8954043dd0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea37856b0268758a43ce5b8954043dd0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ea37856b0268758a43ce5b8954043dd0N.exe
-
Size
64KB
-
MD5
ea37856b0268758a43ce5b8954043dd0
-
SHA1
23ce32bfc4d884b3c610e48349e8233d48be73d4
-
SHA256
c71cb4b27b4d952fd45923353abd221290d702720459b6ac35422222f62a8d3b
-
SHA512
5368c673af7206b746c8d555c13469877fc55963ba9af3b95d8ba39fd0e34e45e11ef69fd7d99a4343156e06f4a813e5ab5535ce4b9b2ee99bd407ad906d4ed9
-
SSDEEP
1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAjUvJQ/johChPhbhhR:lAo1lOwvlKlXBP6vghzwYu7vih9GueIR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4264 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4264 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" ea37856b0268758a43ce5b8954043dd0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe ea37856b0268758a43ce5b8954043dd0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea37856b0268758a43ce5b8954043dd0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1540 wrote to memory of 4264 1540 ea37856b0268758a43ce5b8954043dd0N.exe 83 PID 1540 wrote to memory of 4264 1540 ea37856b0268758a43ce5b8954043dd0N.exe 83 PID 1540 wrote to memory of 4264 1540 ea37856b0268758a43ce5b8954043dd0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea37856b0268758a43ce5b8954043dd0N.exe"C:\Users\Admin\AppData\Local\Temp\ea37856b0268758a43ce5b8954043dd0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c743a76ec779d0bfe0daae1075bf05ac
SHA1e1446ff187b39c5ba7821fcd538f86659e325efc
SHA256e2e3bfa0155a4e27b7adf88edc81432ca5847e41489570204dcce12385149203
SHA51266ede6f10df842336ed7303024caf0965d132cb0390b11bd4043f17f3044821888215ab8bb33bb9165c82e356c90938dd3bc99ce7de6fa0384cca3c5212cd182