Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe
-
Size
40KB
-
MD5
bfd1e59b5d7025a3693883b7d7ab7670
-
SHA1
782622cd65eecfd417ac93c0f6a34cf00bb017c6
-
SHA256
9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0
-
SHA512
7fa434490851cf7b5774a2464ca184b1028bf45b9cd8a939cfd6321362c4d7dccf991c7013abd65e0d8f848e6c36e0cc9ce199bc75dde38df9d0c044349e7789
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAcBHUIFvV:e6q10k0EFjed6rqJ+6vghzwYu7vih9GL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3468 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3468 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3468 1616 9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe 82 PID 1616 wrote to memory of 3468 1616 9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe 82 PID 1616 wrote to memory of 3468 1616 9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe"C:\Users\Admin\AppData\Local\Temp\9fcc3e668fd051ffdc13f41756d986e0f25a513ac54be1e2ab80f3c7721896b0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD565032b0b0d77de22fcadd299a48bec5b
SHA1d932afd4d09dbedc9fe5175b88f1e54d0783575c
SHA2565a6d68fe15ba8ebf9662b28e41005b3ac13a3baf5ab89bc67886bf2d45f37161
SHA5120932aebfbb11c89d7e29efe40a79d6306710b2bc44a099871e49ddce39d42609b2b0cb44a4896ec81beb745be5dd65da26ac42f94b5678bdb4b3f7aec81c58d4