Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe
Resource
win10v2004-20240802-en
General
-
Target
60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe
-
Size
63KB
-
MD5
86a15a028eceb5bb24e895c0601406b0
-
SHA1
7709382c7cc831b85648e53548bd6f812963bf00
-
SHA256
60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045
-
SHA512
37dde6ca9649d5e2da88b3a71a6fe690f5d12d781f769500822fa467b998c9b8308a2902ddcab61098312a0957db6ffe825c66353adf9353301ee07b231661a9
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjUvJQ/johleHhvGh4Y:NAoglOwvl4ulkP6vghzwYu7vih9GueIY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3000 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3000 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 3000 2852 60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe 30 PID 2852 wrote to memory of 3000 2852 60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe 30 PID 2852 wrote to memory of 3000 2852 60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe 30 PID 2852 wrote to memory of 3000 2852 60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe"C:\Users\Admin\AppData\Local\Temp\60adf5dc2f750370cf616faa0e7fd9b73f2704f37530d1a40b6c2d73e6905045N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD585e2a140fa5fda0be3cbc417c9e57668
SHA1ccbe8e548e1fe0549d79c11f3d9c1d869a3f4319
SHA256a144773bf9423971f667aed8df7cfd433ff536e4a13ac8d27a9e2fe3465a3723
SHA51202978387a1086f5ad25fc1b9ca86fb232e64cebbf10e9476bbff40067a9152c82b8ccf05ecfedb4b7a48ab2a2a2fc85c7a18451ac5f316c88a8e37f1d58ba74d