Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe
Resource
win10v2004-20240910-en
General
-
Target
a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe
-
Size
62KB
-
MD5
a09b5e63e1d8819918022126e9756a30
-
SHA1
ebb76ca93e87a878842b9b47133b2a5ac762d7ac
-
SHA256
a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7
-
SHA512
cb5e857ae259ad3406ba62c8709319aa9a06def9f769047b3ac5d678f953ce3908c468668562fe26cecdeea1f7feff16a5846c4c131f1b91d02811ff3a83029a
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbIKjhEhzh20:NAoglOwvl4ulkP6vghzwYu7vih9GueIR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1332 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1332 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1332 1640 a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe 30 PID 1640 wrote to memory of 1332 1640 a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe 30 PID 1640 wrote to memory of 1332 1640 a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe 30 PID 1640 wrote to memory of 1332 1640 a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe"C:\Users\Admin\AppData\Local\Temp\a063a9cc2001b49c3d3c6c0da96cd22d6526baeacaa010a5fb24aa7faea853c7N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:1332
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD577abd6ee4dd9dd92a46530e6fcd78d4c
SHA17f7fc0e427a4297c25a27cc3fa8eba0f14cd578c
SHA2560c3fec54a5e97bddf848d60ea36a23292afc07b2fb3c7f3c2d9db148d9846e6d
SHA512ded5108a2c3e350f21f583b8e002edb668d199ef9e5b5633cff271640d4d798b54d17581ce787f5a3f71c4e611bcbcb01d76065c8ce8e26fec72248af2a602bd