Analysis
-
max time kernel
119s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 11:38
Static task
static1
Behavioral task
behavioral1
Sample
34551efe84927440263955a110559da0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34551efe84927440263955a110559da0N.exe
Resource
win10v2004-20240802-en
General
-
Target
34551efe84927440263955a110559da0N.exe
-
Size
64KB
-
MD5
34551efe84927440263955a110559da0
-
SHA1
c92e202703434f2d1076ad6999c1523012ee2cea
-
SHA256
8065e9bbbdd353112284dd7c7573a0fa1f055a838f0ed19c4baee9c3089e7967
-
SHA512
f26e22892fff65f9da5c4244b6ca8972aecc9509bb0880bf676091e723c58a6970ab834b230d45a43aa531f534b10a1b20a217669be1c42a6a7e8f196de496c0
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6v8tvGE9UHrSdghj8bvHRIkhbUIchUh80mhDoOhIDhx:NAoglOwvl4ulkP6v8tvGE9UHrSdghj8v
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4636 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4636 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 34551efe84927440263955a110559da0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 34551efe84927440263955a110559da0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34551efe84927440263955a110559da0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3008 wrote to memory of 4636 3008 34551efe84927440263955a110559da0N.exe 83 PID 3008 wrote to memory of 4636 3008 34551efe84927440263955a110559da0N.exe 83 PID 3008 wrote to memory of 4636 3008 34551efe84927440263955a110559da0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\34551efe84927440263955a110559da0N.exe"C:\Users\Admin\AppData\Local\Temp\34551efe84927440263955a110559da0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54f6784da1b892d8ce5c968ed4c6288f2
SHA1e332862b3674d66daed1ccb3165cc80aaa97a830
SHA25627c08143e20effb94a32eff78cd6ae35e70f0e43f18001cd321e4b10689f7e44
SHA5129ee7ba50ca072109fa62244d1df7f6f91042cf0dc825f463b270d272ed32facde8ba07287e86970bee6182274a0ce29b03589d5e71c949342942a410bdb624ef