Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe
Resource
win10v2004-20240802-en
General
-
Target
0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe
-
Size
79KB
-
MD5
e683fa39306a7ce2926834b0a3048460
-
SHA1
38352dd9e000551f179d7f1cbd84ce69cc7d3a0c
-
SHA256
0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2
-
SHA512
e2e22248788c23820c2f2176b5e6509f346eda602270fc5781e4d49f4891cd6a44315a467346c97eb70fff4f4c678add082b34a8969ff82eefdadbd9457051c4
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OInvnHvvxIfhqhcGoI/z:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2816 2792 0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe 30 PID 2792 wrote to memory of 2816 2792 0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe 30 PID 2792 wrote to memory of 2816 2792 0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe 30 PID 2792 wrote to memory of 2816 2792 0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe"C:\Users\Admin\AppData\Local\Temp\0f02d9a50ccc73eaae8a6fc80f0c492900092f6855337cd1b24d35787731c2d2N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5189998ed1165096eeec5097aaf1f4592
SHA1bc8513db2d84a81a7c716aa9571d7321122bae6b
SHA2563ebc0fe4e7e5527e70380936b2659b3d22a63dd8aeda3e7c8235417c833ace12
SHA51207ae05453a525c1a3294bbb54c69d928975837089b962fa8326b38d2bb73f8b693f3474da4cfb4c5f5221bd82ff6e9c34a0dde2b281dea110ceaac8bdba04d6e