Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe
Resource
win10v2004-20240802-en
General
-
Target
cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe
-
Size
69KB
-
MD5
f4e40459f052d23eea19822461ca2b40
-
SHA1
70217f5ddf38f7d9e5adfe6939a501fba8dd6642
-
SHA256
cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76
-
SHA512
b42d474b2bd2ffb45b9a1ef8020762a0ceecb3d31f60cee0792352858e64e2154c02c9ac4807c06f313d40db5f857555b75cf180727adceb7650ac7d29b5a7b8
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjUvJQ/johChPhnhHuF:NAoglOwvl4ulkP6vghzwYu7vih9GueI+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 324 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 324 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 324 1720 cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe 30 PID 1720 wrote to memory of 324 1720 cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe 30 PID 1720 wrote to memory of 324 1720 cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe 30 PID 1720 wrote to memory of 324 1720 cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe"C:\Users\Admin\AppData\Local\Temp\cfcc181a4914e5388e469b5718c07efd5a8aa0c96a7b1be2a2e8dd90cb553b76N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5fbae0e6d271ac97de753f72fa76eeba2
SHA186789f4c40094d98e525b92babe31ad53017efb6
SHA25672fb5d81e446285c5b1b358d678982d6be9b875e36665b90bd25f1b6eceb2254
SHA5124b4a95f525fcf081b8d6dd1a9e64ae29501cdb80e22d98d9fdec575d1c824e0e2899885d12caf17b65e573855f777eafd5199a4c24e2e2652d54dc7de60f3a85