Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe
Resource
win10v2004-20240802-en
General
-
Target
401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe
-
Size
44KB
-
MD5
0726d470d348e15c94ae1a31fab08110
-
SHA1
e4d2e979a12a975bad20d0db140660f1c949fbbb
-
SHA256
401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8
-
SHA512
6cc317e467814e8843363d6f5dc31add956680de8951451cc029c5eccb884c3837d11a06289c76e4f7b1df32d93078111b12e391c72d06c0e39627e0b00d8cc9
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAcBHUIF2Y:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4056 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4056 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4056 1004 401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe 82 PID 1004 wrote to memory of 4056 1004 401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe 82 PID 1004 wrote to memory of 4056 1004 401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe"C:\Users\Admin\AppData\Local\Temp\401652a9488a349001928cad6fb2950a48a6bd95a055d3f14fbe5aa232abbde8N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5adbede4aa3b1a49a0ea09c5269f9161f
SHA1fb6efc83f48daada884c82ae684a8c7d1dde2958
SHA256718cd2cdc9d11c3d1a9ad7d23b60b36af35dbf4ac3e878d484fc238f45091d27
SHA512f542ba8518f4397cb117bbb9289b612b089faa10a05750341907b73788bc14c46ea73108d55f70d8f698a9585419505411d3cf0dfdb9273e4795985e6c3635f2