Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 03:28
Static task
static1
Behavioral task
behavioral1
Sample
18a25ed40c9771fc673a42fa4bb6b6f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
18a25ed40c9771fc673a42fa4bb6b6f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
18a25ed40c9771fc673a42fa4bb6b6f0N.exe
-
Size
75KB
-
MD5
18a25ed40c9771fc673a42fa4bb6b6f0
-
SHA1
b332c616eed6c3a5d9a40ba11949d1c9107ea72a
-
SHA256
3dd8aad57601faf68d9a3b2bdfc457a0a21eb12b074aec499e343c65022e1f85
-
SHA512
de31ab23a37ab60c63a0dae5241b73aa17a357262b7cac5e5f2d4990bb6b3a1f09f2078f5fffdfb7a4f226c21ba5a22981046c39fa5ba60a942d30ebb854fe27
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCIzhUvTm:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhA0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1440 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1440 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 18a25ed40c9771fc673a42fa4bb6b6f0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 18a25ed40c9771fc673a42fa4bb6b6f0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18a25ed40c9771fc673a42fa4bb6b6f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2056 wrote to memory of 1440 2056 18a25ed40c9771fc673a42fa4bb6b6f0N.exe 90 PID 2056 wrote to memory of 1440 2056 18a25ed40c9771fc673a42fa4bb6b6f0N.exe 90 PID 2056 wrote to memory of 1440 2056 18a25ed40c9771fc673a42fa4bb6b6f0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\18a25ed40c9771fc673a42fa4bb6b6f0N.exe"C:\Users\Admin\AppData\Local\Temp\18a25ed40c9771fc673a42fa4bb6b6f0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4228,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=4508 /prefetch:81⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD53959e65f1018e1b9223103b0c1bc0e12
SHA1145992014f3d510a1df556ff75749dbe4a101738
SHA2560148f8e95a8f1e88e38028918af7e5a02f04d8d4fc7d406427e74ab26dd57241
SHA512b26f1dd3ae5066d05b1eed05012c263e9f4f37d43d6434733999d4285643841d79057a67e5fc2a0609f8d2e5ea893d91dfe665ba660bb5a9f99e26a51f85f716