Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe
Resource
win10v2004-20241007-en
General
-
Target
a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe
-
Size
97KB
-
MD5
0fbe2d9e674a80cb94cf3b8c7a99a5c0
-
SHA1
acbf82d6a891fbea28e1a997c1d7e0841a115f09
-
SHA256
a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593
-
SHA512
2ed1178c78ebfa0e91b12be5e28424de74bb3538ccca9727890945a70bd5a8291748550672068b8d43f74d597aeb44e30d84d860833249683b816441124ea578
-
SSDEEP
3072:FlnnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nbnl1RRhCHODMe1C:zw6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4376 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 4376 microsofthelp.exe -
Loads dropped DLL 1 IoCs
pid Process 4376 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4376 microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 696 wrote to memory of 4376 696 a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe 84 PID 696 wrote to memory of 4376 696 a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe 84 PID 696 wrote to memory of 4376 696 a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe"C:\Users\Admin\AppData\Local\Temp\a92815778cfc6ce61a77a9f457214e72815b802afc10ce3402389bcf7bcca593.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54c0b9970f96300dfa1f45afc7539d35f
SHA1ebbb4ed2003662d78d1f32e7b6da1b6f504ae711
SHA2564e96660cc8be7171a79755a20860366987547322b3a809e78c9850f14c242262
SHA512579f8787b52bf62a0296d8a24753263201fbc84abec5927033e3c97576f965ead0f8422acd3f7af1345b0df0001b0cd68fa971062e21269f6940cf3e1508ca88
-
Filesize
97KB
MD5a7dfda64ddd6e9a5454a56925d2bf625
SHA1b0032bd5e3ec4ecb7312e678ac64f90496167fa9
SHA2562769f12f891e71a146e5d7b156bb140d4261d64b2b08de9d07f82a607fd359f8
SHA512993b1423c7e6fb7dcb69cff236c0f98097b0c07042ac95b2aba7968cd2e8b130a2ad7cd3651868fdae0989dec8573e449ad304f6872d53602892fe29cc760b5e