Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 15:00
Static task
static1
Behavioral task
behavioral1
Sample
c1e4d58a90b2f2da19914118168414b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c1e4d58a90b2f2da19914118168414b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c1e4d58a90b2f2da19914118168414b0N.exe
-
Size
62KB
-
MD5
c1e4d58a90b2f2da19914118168414b0
-
SHA1
ee55bd53ac618157d53d9b05816a5248a0c1a53e
-
SHA256
1e1328a859604f022f7266756ae4448ca4907d08d260546afb5be9b2f7792091
-
SHA512
fdd574ba2a0306b51a146d642e3d270cc3fabfcf0b75f17ba91ca32d55860c19c8c63fdd840873a8d9090bd6c9776e7dbfc2c00eb449f34b482f78f99ebdcde0
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAcBHUIFvSHbhhH/HQhR:NAoglOwvl4ulkP6vghzwYu7vih9GueIg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4084 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4084 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" c1e4d58a90b2f2da19914118168414b0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe c1e4d58a90b2f2da19914118168414b0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1e4d58a90b2f2da19914118168414b0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 228 wrote to memory of 4084 228 c1e4d58a90b2f2da19914118168414b0N.exe 90 PID 228 wrote to memory of 4084 228 c1e4d58a90b2f2da19914118168414b0N.exe 90 PID 228 wrote to memory of 4084 228 c1e4d58a90b2f2da19914118168414b0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1e4d58a90b2f2da19914118168414b0N.exe"C:\Users\Admin\AppData\Local\Temp\c1e4d58a90b2f2da19914118168414b0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:81⤵PID:4300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD55ff091236d1d86662733e2537a12ac69
SHA1de83a6b3a30e27f2bceffa8db8e961ed535b0fcd
SHA25645c5ad8c22e318cd5a7007eea3a6d8ed899510391d13ac41188c0882e5856012
SHA5127431a9947a164f72695c9797fdaa70b2d9d4361e77939e8d5d260f08265e573169cb674b3e381062c0362592f7cc89346443fd1cbaf597939d4d1472432c0337