Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 06:57
Static task
static1
Behavioral task
behavioral1
Sample
5b51d272a8242933339795d99ac3df60N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b51d272a8242933339795d99ac3df60N.exe
Resource
win10v2004-20240802-en
General
-
Target
5b51d272a8242933339795d99ac3df60N.exe
-
Size
77KB
-
MD5
5b51d272a8242933339795d99ac3df60
-
SHA1
79cf141515070d84e765a21e417e3ed573fbaf07
-
SHA256
da395c3189f346b672bdad80001e24eca0077772ac9e5080d65fe6c38e90e21e
-
SHA512
9a61ab09a28f6f843c88abfbf7baf339758cc17623cd25b470515961b08839ad3a6303b1b6ad7994ca990c4b87a4fba54808989d7bc9f0270242a66370f6804a
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvPHG3GvUhCHi1X5GoOvmHO1:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 720 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 720 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 5b51d272a8242933339795d99ac3df60N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 5b51d272a8242933339795d99ac3df60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b51d272a8242933339795d99ac3df60N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 720 2000 5b51d272a8242933339795d99ac3df60N.exe 30 PID 2000 wrote to memory of 720 2000 5b51d272a8242933339795d99ac3df60N.exe 30 PID 2000 wrote to memory of 720 2000 5b51d272a8242933339795d99ac3df60N.exe 30 PID 2000 wrote to memory of 720 2000 5b51d272a8242933339795d99ac3df60N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b51d272a8242933339795d99ac3df60N.exe"C:\Users\Admin\AppData\Local\Temp\5b51d272a8242933339795d99ac3df60N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD56c04fc4cc5ef3c02fef0db90bf382c62
SHA1c33b153576a8ea99308d68943e0e30baebf5a863
SHA2562d26dc69ddd7d4c3ec97a36365ca0323c94cf642bddf756dca34a5cbe514c994
SHA512f62d483e3ee13212551225bdf561b1b9f3febe0105ea8d2a11427a80d94df65b0886d7f0a019b71672cc44ab1dbbf033ecd6f1c5663f2b0f575bb43cbbc86d9c