Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe
Resource
win10v2004-20240802-en
General
-
Target
6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe
-
Size
77KB
-
MD5
30d29de69675882ff769949d9a7364f0
-
SHA1
cb4524e33c12403ff01d113762fa24f52cc4e9e3
-
SHA256
6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8
-
SHA512
fed931b3c4cf5361ff444a707d00c17f3892b12f47585d09f5f46f2ad4d401d51f41af207fa933c55ec1a9a938d4a562e423a2bad7599b992a484a124a6b6079
-
SSDEEP
1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCISGGHMi:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2996 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2996 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2996 2068 6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe 30 PID 2068 wrote to memory of 2996 2068 6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe 30 PID 2068 wrote to memory of 2996 2068 6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe 30 PID 2068 wrote to memory of 2996 2068 6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe"C:\Users\Admin\AppData\Local\Temp\6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5ccf19238a956b4c8d319bbd3f7730148
SHA1f03e0b278d0b1a449bfe29a491575e5032c92f3f
SHA25627f5e2285f1e08392f8f6f5353c67ff2d5fa66e93a3f8f54bb157e57b9bed650
SHA5128b710cb5373c7004f2300f1bb039aa0e4e91fcf5f991f15075972cb4cba254533229e61367542d906776e82f7d5bb2347795a53331081e416f2e5dc306414f0e