Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe
Resource
win10v2004-20241007-en
General
-
Target
ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe
-
Size
46KB
-
MD5
a7c91b39fcec4a9d380c751a0e46051c
-
SHA1
f8819996fe680c08ca95ce2fdac6c84f230750f6
-
SHA256
ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462
-
SHA512
bb403a7660eb18229c4dfb3ccc679314f638159c9c817ff76b5b9513b8ec1cef048342d7718ea0a411cb5f4288c366fb4c11b65086b2758d3892210f0f547f14
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6ID:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gf
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2064 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2064 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2064 3044 ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe 30 PID 3044 wrote to memory of 2064 3044 ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe 30 PID 3044 wrote to memory of 2064 3044 ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe 30 PID 3044 wrote to memory of 2064 3044 ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe"C:\Users\Admin\AppData\Local\Temp\ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5a40b2b0e8c69776ee36acd065f0bce77
SHA194e43abcb27efc5751d9105e85dc943f3b3f63f4
SHA256849780536e64bc5dff1a3655b3cf8ced8093ba4466d8728c0d2392417ff7a49d
SHA51267acebba8c0a05120c4607e84b33cc095f42bc70c3d7aff61e74e3ed556cf1ecb863f62ebd42d11b59ed118f660380c5dc6156716683869d337a74b84ff3ea7a