Analysis
-
max time kernel
120s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe
Resource
win10v2004-20240802-en
General
-
Target
9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe
-
Size
78KB
-
MD5
4c379a0735ad63ac03deafe974ec7570
-
SHA1
11b985f94766da3a3aa31fd8f9dc85e92b656e71
-
SHA256
9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63
-
SHA512
96cb2534cc6327edac411b10abfdd000ae7f03e05e6edbf6289625755b30901e957e40b960ad8929d77751060cb242ebbdfc9c9c7c63f30842e5e4e4cdc19c68
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvPHG3GvUhCHi1X5GoOvmHO6:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2648 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2648 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2648 2796 9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe 82 PID 2796 wrote to memory of 2648 2796 9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe 82 PID 2796 wrote to memory of 2648 2796 9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe"C:\Users\Admin\AppData\Local\Temp\9923cf7c7fc104986568053ce6baae4ae009cb63616788b81577042adbc01c63N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD55d7edf7faca012776def9b4921cda564
SHA14890d4e86292b421f79dddcdaf48c74de585ae9b
SHA256b36fe2f2989684df12d921f57596c09e236af0b1bbe5aeeec721439cdbdc4488
SHA512a999a29a0b02a98da6d6d08d31306ec5389f96d0c90842ef760a96c92d412dbaaccb1189dc48d3a9ff58b3cc5d63086b1f771c03c432417084d7442b7a97005e