Analysis
-
max time kernel
149s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe
Resource
win10v2004-20241007-en
General
-
Target
b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe
-
Size
94KB
-
MD5
748865431c3f8479f84086cc53bdb4e3
-
SHA1
71c34355b9e566dbf6e2374a2995be08378880a2
-
SHA256
b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e
-
SHA512
07b178c48e65c91a8852181a2f35944fe43571c3ca47b14927b84874512c10186a8d4a59f8037a98ae4afba57afce8f3fb5e42133a8815119575acd7fa52beff
-
SSDEEP
1536:vAowfbJFgjQ284U+w2EwRz/IUqXBn22n2222IICUrh1EasEE1YCfCnEEEE1E14Ah:vAowVFgjQiUkEwt/XqXBn22n2222IICG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1548 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1548 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3524 wrote to memory of 1548 3524 b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe 83 PID 3524 wrote to memory of 1548 3524 b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe 83 PID 3524 wrote to memory of 1548 3524 b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe"C:\Users\Admin\AppData\Local\Temp\b547f3aad283fdf51bd6cee5258bebc0de94446e04afe9aff91b21a4a602ff1e.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD508ec31098d30de9fae75c9aa40e66279
SHA15edf862c6b6d8310362f59407453580efe04274e
SHA2565c4ca429bcc1ce85ded570fea5b67048ddae80d9c52d3fc8dd0866db45f5bf92
SHA512070cbb51898be8c8a14f8836f37ff75f5eb62c441fa6f36cb16d14cd2bc82d691006d9d40860d8afa5a4706955c1b0a35f8bc0bebf2d838f84fb308a832cd9d9