Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe
Resource
win10v2004-20240802-en
General
-
Target
2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe
-
Size
77KB
-
MD5
15158e9dced3bd864dd92a576821b530
-
SHA1
16a6ed91cb721fa3a057da0fa603c1f08df3bff8
-
SHA256
2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83
-
SHA512
d8ee67f46afc32824a5900f8dbc12b188b591185c61dcd7752d99b1376ed8c5e137298a4b286ca9b17060a187c11f6abf531f10262ad2383e9b1832eec433aea
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OInvnHvvxIfhqhcGoI/u:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2316 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 876 wrote to memory of 2316 876 2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe 31 PID 876 wrote to memory of 2316 876 2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe 31 PID 876 wrote to memory of 2316 876 2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe 31 PID 876 wrote to memory of 2316 876 2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe"C:\Users\Admin\AppData\Local\Temp\2fcf087f8b59944ec2f1c5a035950f5024c8f8ec86f3b0a8de5a820a2df91c83N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD557a6ef2cc668c51bc146ac677974cf96
SHA10be0d36c05caaea6800dc29a3db27192245cc536
SHA2566232941cf58a486f95c1bc9a89790303f23e5a9564f4957f672d8167202e1b0a
SHA51217aed7a95c6b372021db2a6d9c5bec7c607b74ff03f44366a7dd3f8e61b081e2dd59545654feb9dc0d462b8f6e53747878b5ed7d4a4a3e6a6982720452c6132a