Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe
Resource
win10v2004-20240802-en
General
-
Target
ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe
-
Size
43KB
-
MD5
8eefb4a4134428b7e49310ef5ccaa500
-
SHA1
8ce573b00d06c3fa1704738ca33c0687dbd8728e
-
SHA256
ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466e
-
SHA512
a12a7e13da907a3a95572fe9a580fe199c9bffa41084daa18543a3ce1adb798bc04a0d3d7f73bcefc817254cae2c1d9624e0d959aea976965a7d1b7111a88918
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAcBHUIF2r:e6q10k0EFjed6rqJ+6vghzwYu7vih9GU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2416 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1876 wrote to memory of 2416 1876 ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe 30 PID 1876 wrote to memory of 2416 1876 ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe 30 PID 1876 wrote to memory of 2416 1876 ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe 30 PID 1876 wrote to memory of 2416 1876 ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe"C:\Users\Admin\AppData\Local\Temp\ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD518ff68eeeeb939a6c548a340bafb4faf
SHA148dafce47e0c65ec564f2730d0a9b2b9197a5127
SHA25601385db8c04a8fb0ac12219e2c3fa6cc628b0f0f09d50bf2c8bdabe8b941603e
SHA512e0b97dcbb423bd5602b3283077f0ad174a998c52584c897c671a86c4a2494b5cdcab7eecd89a18a1ecf144dc47efe90c29df62b8bad123e46592ca7635cf8dc1