Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
ec7ebb76ee1d88158328ce1596f19550N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec7ebb76ee1d88158328ce1596f19550N.exe
Resource
win10v2004-20240802-en
General
-
Target
ec7ebb76ee1d88158328ce1596f19550N.exe
-
Size
65KB
-
MD5
ec7ebb76ee1d88158328ce1596f19550
-
SHA1
25ae90f04a9f1210162da19b00bb611419e8c90c
-
SHA256
720b183b99bfce4279a0232202bb101507e2224a9d2c41593a6d90bb67bff1c3
-
SHA512
675306c6078d98df179fa4c8d7f3eb28800d742d72c8e87a6472b9fad57c2ecc4edcd545284446be4dc1fcaa4c95ac63a0c46c060065bf93c32a3a8603ee7503
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAcBHUIFvSHbhqhYhlvG:NAoglOwvl4ulkP6vghzwYu7vih9GueII
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4040 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4040 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" ec7ebb76ee1d88158328ce1596f19550N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe ec7ebb76ee1d88158328ce1596f19550N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec7ebb76ee1d88158328ce1596f19550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2488 wrote to memory of 4040 2488 ec7ebb76ee1d88158328ce1596f19550N.exe 83 PID 2488 wrote to memory of 4040 2488 ec7ebb76ee1d88158328ce1596f19550N.exe 83 PID 2488 wrote to memory of 4040 2488 ec7ebb76ee1d88158328ce1596f19550N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec7ebb76ee1d88158328ce1596f19550N.exe"C:\Users\Admin\AppData\Local\Temp\ec7ebb76ee1d88158328ce1596f19550N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD54bc7f3816b1e2b69efe9f5b1db91d110
SHA1b43824fb39bf206fdf9743d370fc4376fab4ce90
SHA256dd65a409d2fa090b357ded2507e87492167f5069b635f262980de98dac465de6
SHA51230df7887e5952e82ae665029777952658e49fc5385bbeb748b0d54dc87984b4dc1cffd037744c7952410cb7d290b25da74f228fd87264eb8ddaf65a299f68336