Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe
Resource
win10v2004-20240802-en
General
-
Target
4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe
-
Size
63KB
-
MD5
dc2682f7f727b35932ab58fdd2569ab0
-
SHA1
03cfd02dcc1031e089da56cb6e4ea6395dc0d357
-
SHA256
4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435
-
SHA512
2c3d2ca72312d26439dddf3184ddd24333e9be6883d50d3bc689685000d69f243af900aae50237e5cc9cffd825b42306fafb7a3d8304377927fa198c109609f4
-
SSDEEP
1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAjU+EmkcU+uZd7ZYhH:lAo1lOwvlKlXBP6vghzwYu7vih9GueIV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 556 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 556 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1880 wrote to memory of 556 1880 4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe 89 PID 1880 wrote to memory of 556 1880 4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe 89 PID 1880 wrote to memory of 556 1880 4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe"C:\Users\Admin\AppData\Local\Temp\4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1040,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4608 /prefetch:81⤵PID:912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52a6b06160341b683d1fa51c74a41ba9b
SHA1ee85e38b632e7da657419e9a862bc89d81a787cb
SHA2566dbd3c2d0ccfcec321d4d58927896d0ee2eb9627781bf65093b54b14edf5ba07
SHA5122a8f9286113daf0dbbd1eaf34d3b23e833ee1a26e8557ffd4c5f8ce0f31e0a6e6bcfe72c4ca2bfc38f089d3edb7795522c1f1bd47a404a15a67350f4aa0799c3