Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 00:34
Static task
static1
Behavioral task
behavioral1
Sample
3eddd85530c4bd3f37e9109942e36040N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3eddd85530c4bd3f37e9109942e36040N.exe
Resource
win10v2004-20240802-en
General
-
Target
3eddd85530c4bd3f37e9109942e36040N.exe
-
Size
79KB
-
MD5
3eddd85530c4bd3f37e9109942e36040
-
SHA1
4d1539ab45a9b196318b7489207235002db60013
-
SHA256
31d597832381b8942553b8faeced3c5c79cbeb84ac5b21879326ec7df9cc187d
-
SHA512
fef29c215b3e3b398ef3d2775cef87a3a44bee8127bd13eb66bdc22513b9d495c3f15a65badc6fbac5c70fc409ca6be38397da6f3ccc5ec0c442e46b294c6154
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCIzhUvT3:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1316 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1316 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 3eddd85530c4bd3f37e9109942e36040N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 3eddd85530c4bd3f37e9109942e36040N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3eddd85530c4bd3f37e9109942e36040N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1316 2404 3eddd85530c4bd3f37e9109942e36040N.exe 28 PID 2404 wrote to memory of 1316 2404 3eddd85530c4bd3f37e9109942e36040N.exe 28 PID 2404 wrote to memory of 1316 2404 3eddd85530c4bd3f37e9109942e36040N.exe 28 PID 2404 wrote to memory of 1316 2404 3eddd85530c4bd3f37e9109942e36040N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eddd85530c4bd3f37e9109942e36040N.exe"C:\Users\Admin\AppData\Local\Temp\3eddd85530c4bd3f37e9109942e36040N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:1316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD58bf051c020e222d131f6cf54e28ed985
SHA19be1c3efec1011c41c85a59ac17f77b97d024d5c
SHA2569485facef5c52f6a1fcb779638e250aef2a478ae87c14972338bbe916ad60c50
SHA512837aa0191f888dbd85c416eb66265058e2c62b804d42109ac3dce0d60a32b5f4826adeddd0d033fc591db8310ebd28a5002373d43082e0ac138966a8255a6716