Analysis
-
max time kernel
119s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
6c3317724c1587dafd038041e73103d0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6c3317724c1587dafd038041e73103d0N.exe
Resource
win10v2004-20240910-en
General
-
Target
6c3317724c1587dafd038041e73103d0N.exe
-
Size
63KB
-
MD5
6c3317724c1587dafd038041e73103d0
-
SHA1
d15dd37c29da3be93ee6068a9a0db2e2c8750c25
-
SHA256
3e6d34598b4d9cb71e2e6ca95028b4df6411e2e3d103e327a10dc09b9246c854
-
SHA512
f726a320b9f7d16b1b85f4832e88c65ea31c211a3f6e5cfb29e5675b099e9d2aa0d5a6afaea09a1eecfecf15b0b73f36f80428ad40d06e640364d537a608a027
-
SSDEEP
1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbRJhhqHihL:lAo1lOwvlKlXBP6vghzwYu7vih9GueIy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3268 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3268 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 6c3317724c1587dafd038041e73103d0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 6c3317724c1587dafd038041e73103d0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6c3317724c1587dafd038041e73103d0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 952 wrote to memory of 3268 952 6c3317724c1587dafd038041e73103d0N.exe 82 PID 952 wrote to memory of 3268 952 6c3317724c1587dafd038041e73103d0N.exe 82 PID 952 wrote to memory of 3268 952 6c3317724c1587dafd038041e73103d0N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c3317724c1587dafd038041e73103d0N.exe"C:\Users\Admin\AppData\Local\Temp\6c3317724c1587dafd038041e73103d0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5c6ac85e24d6b4aa4cd2b24580c5ea595
SHA112f4280e7782a79ccbdaf0048b8b7df09d756a13
SHA25633725365e9ba02a27e67014d12620dc9ef6370d68f258b3059ac353fe925d921
SHA5129e37a71698d8678896456144a4f2d7e7247a62b7fa5c291ab7e3a7066d0223f9cb036ffe282b876e7f6b5915861c2c28999238389c95998a5eb3ceea863aa73c