Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
556c3f938a7ee7a95ef21ebb8660cfe0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
556c3f938a7ee7a95ef21ebb8660cfe0N.exe
Resource
win10v2004-20240802-en
General
-
Target
556c3f938a7ee7a95ef21ebb8660cfe0N.exe
-
Size
66KB
-
MD5
556c3f938a7ee7a95ef21ebb8660cfe0
-
SHA1
f4034c04110fbe51e19cd24deda7aa947e60effe
-
SHA256
9e3f082bc9b995ce029c11e6c7a9a29d4663ecc8e400a1f648ae9a29562ebdab
-
SHA512
727b541cde2c25506801e726d61000e5be23de39e0dfd6787d43f12f7b9b1e003a2752b3bb4f7575f481b0f800a20a54137d13f6f91aabd120d69efd8f527d0d
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbIKv8hGIhvj:NAoglOwvl4ulkP6vghzwYu7vih9GueIx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3760 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3760 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 556c3f938a7ee7a95ef21ebb8660cfe0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 556c3f938a7ee7a95ef21ebb8660cfe0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 556c3f938a7ee7a95ef21ebb8660cfe0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4324 wrote to memory of 3760 4324 556c3f938a7ee7a95ef21ebb8660cfe0N.exe 85 PID 4324 wrote to memory of 3760 4324 556c3f938a7ee7a95ef21ebb8660cfe0N.exe 85 PID 4324 wrote to memory of 3760 4324 556c3f938a7ee7a95ef21ebb8660cfe0N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\556c3f938a7ee7a95ef21ebb8660cfe0N.exe"C:\Users\Admin\AppData\Local\Temp\556c3f938a7ee7a95ef21ebb8660cfe0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5108ee089acd107d6b75abf9c34566e74
SHA11f28bb1bcc499ba44a3fbf3a1b74c9febe403cb2
SHA2568e36a6bb05d5f55dac9012da554553ee2a65b1ef853d5fa2ffdddab30ccb49d3
SHA512bf81729c21f5c139902a26a466dad078e8918ca30bd89007b1faa08377a2647807cfce983ee825f8d4a22994326c8d1e10e4244c3e89b7ba9785301fdfdfe71f