Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 10:52
Static task
static1
Behavioral task
behavioral1
Sample
e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe
Resource
win10v2004-20241007-en
General
-
Target
e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe
-
Size
41KB
-
MD5
83f41c19dce3a7dfedb9c3e4293cd46f
-
SHA1
4189d1789064f1b798afa5b570092f33ad589592
-
SHA256
e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328
-
SHA512
d1c4de6d80af1b07e9a7b523d51acde79ba201c3db6b719700e929339b939967458919289015b5cd8f30f2e100e631a4147f3197e382dbdff400bc8b435d221f
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6Im:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gi
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
microsofthelp.exepid process 2456 microsofthelp.exe -
Executes dropped EXE 1 IoCs
Processes:
microsofthelp.exepid process 2456 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe -
Drops file in Windows directory 2 IoCs
Processes:
e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exemicrosofthelp.exedescription ioc process File created C:\Windows\microsofthelp.exe e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exemicrosofthelp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exedescription pid process target process PID 3320 wrote to memory of 2456 3320 e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe microsofthelp.exe PID 3320 wrote to memory of 2456 3320 e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe microsofthelp.exe PID 3320 wrote to memory of 2456 3320 e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe microsofthelp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe"C:\Users\Admin\AppData\Local\Temp\e9dce8ecf2c1d5cc57ff1f1821633bed92bb6113b69cc823bc902c2423128328.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5d2b2e1ef08e8e61b7f44b26d956f958e
SHA1bf518fa75d6126b3d3e19ef9a7642499096e8b6d
SHA2564e9cb089d1dca3629e8780df8ac81692df8cd2b5b0cf68b08f53e0a641254806
SHA5126181fae1e88e5b949b51114eb4217a3222aedffe0df26e2a64074591c83526c0379eb2ad32a9902e81861ab62188ef5482e8895359a8fce92c05a5a62b626afd