Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe
Resource
win10v2004-20240802-en
General
-
Target
eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe
-
Size
37KB
-
MD5
ae558d9722bb2172119df05380c38d40
-
SHA1
e0efc7b59e92b7a30392ecc911c1db000d8fc720
-
SHA256
eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42
-
SHA512
668bf989f8119d4e1a064fa7aa70c920129978eb05bfcd57a26e2843be75431d8fde64b8b2cf014bdc8fee4bb518e3ceecdcf427d229350d806b7ccbe0a80b56
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Emkch:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1836 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1836 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 1836 2584 eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe 30 PID 2584 wrote to memory of 1836 2584 eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe 30 PID 2584 wrote to memory of 1836 2584 eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe 30 PID 2584 wrote to memory of 1836 2584 eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe"C:\Users\Admin\AppData\Local\Temp\eec07712e7ffe855d5f920ad63e0ec139ec7028f879cacca2577e4ffc392ac42N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD552aca2373ed2ea9ccefce6f2c901347d
SHA1eccedf487dd60d5b23d0e71104311a6bc8a3d139
SHA256b133454cc2310e1c8fd239a5f1cd649db065438ce6a499fc92ba680e00e8c33e
SHA512a1b1ca7cc00a9fcf1eb247c98226580158a42fcb39f966f6cf163e8000184f95735bc67a2d61adffcc230345e2adac044d128b15f2a1409517054900b1a34bb1