Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
ae1634f9068d0c98def7c2bf8283e8f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ae1634f9068d0c98def7c2bf8283e8f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ae1634f9068d0c98def7c2bf8283e8f0N.exe
-
Size
66KB
-
MD5
ae1634f9068d0c98def7c2bf8283e8f0
-
SHA1
4901c8f7cc82368f5626a103fa2789c451758aae
-
SHA256
fe690e1830a92c100ac4941c8dd0bc8fba79f042b023e0b42a5b5da323458b81
-
SHA512
dad12a012cb0d17eb80d10c542fdc5042af0b9860150663f3adc163ab4167dc7aed0260deca2a6299a8a4dfce1ee3b3af1e582836e2e0d88e7d7c7d6c70f1334
-
SSDEEP
1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAcBHUIF2kvEHrH1hyx:lAo1lOwvlKlXBP6vghzwYu7vih9GueII
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1212 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1212 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" ae1634f9068d0c98def7c2bf8283e8f0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe ae1634f9068d0c98def7c2bf8283e8f0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae1634f9068d0c98def7c2bf8283e8f0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 468 wrote to memory of 1212 468 ae1634f9068d0c98def7c2bf8283e8f0N.exe 83 PID 468 wrote to memory of 1212 468 ae1634f9068d0c98def7c2bf8283e8f0N.exe 83 PID 468 wrote to memory of 1212 468 ae1634f9068d0c98def7c2bf8283e8f0N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae1634f9068d0c98def7c2bf8283e8f0N.exe"C:\Users\Admin\AppData\Local\Temp\ae1634f9068d0c98def7c2bf8283e8f0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD543dc52faf46043c86540660376917eae
SHA1d45e789856080f26927244439dd7c6b7808786bf
SHA25679cc5da90a7ec749152b01c831e2c9df737308df020c649a93dde7ad9b45db4a
SHA512fd4ec5eed81e50753f171f57a8025fc2bd702dbe0b889975eda8557d3f142ffb79fbe20fa1ba29eae3faacd34a22c25c24eed8d3786ef6df466cb8fdbdf5ad7c