Analysis
-
max time kernel
119s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe
Resource
win10v2004-20241007-en
General
-
Target
1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe
-
Size
69KB
-
MD5
c7877d84634561c7df4ac01ccc9381ee
-
SHA1
cccab01d4470fb914ff398746c37b714281b87a0
-
SHA256
1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441
-
SHA512
05d2aa1735ffbf51eaacfb32ceae8458dca23dc25edbcc92626f6ce6d92287825747c7e915be3660497518ad28fa6c27a30ab34fd141ff73c5c05451b22804e8
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+Eh66C2hthEhH/HN:NAoglOwvl4ulkP6vghzwYu7vih9GueIh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2460 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2460 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4272 wrote to memory of 2460 4272 1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe 83 PID 4272 wrote to memory of 2460 4272 1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe 83 PID 4272 wrote to memory of 2460 4272 1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe"C:\Users\Admin\AppData\Local\Temp\1217dc2f1780df13902934345ca995500652e1516941ebc73d079176a0489441.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5597371d3c2727f72993cbc16678b3746
SHA1b7f49491b95764072b564803b2e4df3353e96b59
SHA2568066854798353f20a02ed690738726dabb31bfd031ba3fca8e33669652368eaf
SHA512656c7a370cbc9793fa8bdd835b7a96efa93a9da68550520f3bf5063d203fbbba2c6d8ff9750028a781ff34fe60a4ce00aed16e98643b3b4e4df1d3450f5eb9ad