Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
02343f7bb35a7f7df761557b83a7b450N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
02343f7bb35a7f7df761557b83a7b450N.exe
Resource
win10v2004-20240802-en
General
-
Target
02343f7bb35a7f7df761557b83a7b450N.exe
-
Size
63KB
-
MD5
02343f7bb35a7f7df761557b83a7b450
-
SHA1
e5105b031021a37bdf3a3a240982979aa7d4af69
-
SHA256
2f3415f225ab6cbfc3b2588a5e57528c9fcd7bf16a3d43b090c88411c7b429f5
-
SHA512
4ebfffcb111daafd0fd17967e85d818aa490fda9467148fced05cee8dd5076d49a80782b26d4374d6db6392ea2cace3f8cf1a562ee397b7c7488308238994481
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+EmkcU+uhShrhOhr:NAoglOwvl4ulkP6vghzwYu7vih9GueIC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2856 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2856 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 02343f7bb35a7f7df761557b83a7b450N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 02343f7bb35a7f7df761557b83a7b450N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02343f7bb35a7f7df761557b83a7b450N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2856 2084 02343f7bb35a7f7df761557b83a7b450N.exe 30 PID 2084 wrote to memory of 2856 2084 02343f7bb35a7f7df761557b83a7b450N.exe 30 PID 2084 wrote to memory of 2856 2084 02343f7bb35a7f7df761557b83a7b450N.exe 30 PID 2084 wrote to memory of 2856 2084 02343f7bb35a7f7df761557b83a7b450N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\02343f7bb35a7f7df761557b83a7b450N.exe"C:\Users\Admin\AppData\Local\Temp\02343f7bb35a7f7df761557b83a7b450N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD57fb5ddbefb789fe3a077da05a8a9e87a
SHA1936cf7f3b04034b5511db8b2718d2b9d7296f53c
SHA256c001aaaa16e7dc11ccf87e8ab7cb444340f287a2d7b97c14e2f8f597ffa8e9f9
SHA512a9812c9a76a6d1e7c50bc3ca6dcaa6bd76f4325a3890895d709706356372bf0843dcd1a9d5106a8ce698581ec2c93fb628ea6cc94e2d6eb077bd7f68f428336f