Analysis
-
max time kernel
119s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe
Resource
win10v2004-20240910-en
General
-
Target
29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe
-
Size
79KB
-
MD5
f11683adf43c2671d31249fc65c0d060
-
SHA1
71091bdafb3063165595a4afe4b04b8eefe95380
-
SHA256
29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76f
-
SHA512
b64f3a519df98eb2e2a7257285fdcfe83fa21bfb32f6bb2513b0c06e8b0f58bfa74e61423243d8cbb6e974015a8e13dc4785b4bd9b240cdf197d41903a5737d4
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OInvnHvvxIfhqhcGoI/3:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhA3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2384 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2384 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 2384 4900 29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe 84 PID 4900 wrote to memory of 2384 4900 29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe 84 PID 4900 wrote to memory of 2384 4900 29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe"C:\Users\Admin\AppData\Local\Temp\29306831d817e40b5afaf61b15ef208e7a8269f3b942dbbc534abbac1b0aa76fN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5ee7cc6191abb2f89ab30f00dfe9a2070
SHA1c10e72bd0cab306938c0b6677b3f6eaf5583acf7
SHA2569d4cb479139b3b11440d65cd1ab9ff8c506a4ffafd052e08cded300f7b41d286
SHA512e70b3c4cd9ef81f2b989eaa7a7a503858d494d26558924625d8f352b54687dd9655654707c5e3700e789ca234af225d4138022cf498e16e4a4cfe9abd53da32f