Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe
Resource
win10v2004-20241007-en
General
-
Target
be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe
-
Size
66KB
-
MD5
f43784dfb4f307b6c2201a18efe583b2
-
SHA1
d615648e69d1cb23e9b144b2ea0fb5b4a0d619f6
-
SHA256
be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13
-
SHA512
9b347c44fe04130ed7b232444a0f9a90d3503db9a0672f6f9d514342016ed806fb2e26dc821f18af9eb5a38d41c664b0bb1f5288a6c9d2a21857667fb05e6234
-
SSDEEP
1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAcBHUIFvSHbhqhJgvbo:NAoglOwvl4ulkP6vghzwYu7vih9GueIk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3436 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3436 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3436 2192 be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe 83 PID 2192 wrote to memory of 3436 2192 be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe 83 PID 2192 wrote to memory of 3436 2192 be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe"C:\Users\Admin\AppData\Local\Temp\be35fb926c1b92d98b35b03fa041539eb0c62b6a8df7d0aeb3faee029a695c13.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5705cbb20ecf538257d29fdc3c0cce102
SHA1c245f30b49eae63df290589e2b602d93e3b83769
SHA256f6472d5e584f6e9504dc950d7bd545415d2c7783bca8703bce59da70bfb417f1
SHA512e92492c1b468f0204c06082e39de2310a198b691814b69334abaf5faa4bd72289b2f654c16ed9fdc56bf9a4b4e09c02d603509b7853db46c44677c990ea94099