Analysis
-
max time kernel
119s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 16:53
Static task
static1
Behavioral task
behavioral1
Sample
27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe
Resource
win10v2004-20240802-en
General
-
Target
27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe
-
Size
77KB
-
MD5
7eedc8ac3c3ab00b58b091be1f1c9bd0
-
SHA1
e73351f864e78ac5546e4fe557654ef1380edca4
-
SHA256
27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743
-
SHA512
695cf1eb139e838edcc22ac94fc4a0581303e5c182ad2c182675e1f7ee06e05e7a9e7df8ecbcbc2a4c98782f877c71e0a7bffbdd5b8919087c5700e7b0fbd42f
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCIzhULoh:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3136 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3136 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 3136 3916 27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe 82 PID 3916 wrote to memory of 3136 3916 27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe 82 PID 3916 wrote to memory of 3136 3916 27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe"C:\Users\Admin\AppData\Local\Temp\27b00f4268e1d4187bbfcfdc920450355270337f3fd4f1c8ef28b320da4d8743N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5174344083df9fdfd3711175398e9b146
SHA1c260a1a8c714410a7336e2388e84f1da11a81be2
SHA2562e51e5a87a87393d085357e089c0c632df8219ee849ba945353c76161f634e37
SHA5122f16df064732ae12754991fee042ab1a5a91edaa2eb05770ece3bfb711b337daec312df3e4a81657d610bbdf8f4a50fbc246f0e93449d31f16ad56d0ed9698f0