Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe
Resource
win10v2004-20241007-en
General
-
Target
eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe
-
Size
44KB
-
MD5
5092744b9ba9a95b6835e5da0cd525e4
-
SHA1
e1039b72932bb29b983e2f35c1c9da896467e961
-
SHA256
eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213
-
SHA512
8ddb982264a0901c0ff602f137d75d4721ff493998ab27de00f2a52e8e53b8a413f2299bc299dd9024d628e8213ea5d4dea97418780c20021704caab06c84ab6
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6I2:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1448 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1448 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 416 wrote to memory of 1448 416 eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe 83 PID 416 wrote to memory of 1448 416 eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe 83 PID 416 wrote to memory of 1448 416 eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe"C:\Users\Admin\AppData\Local\Temp\eb36b2fd425732eacb61884356cebe9c636a13041b0aed52c383ee4af0edb213.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5ba69e1b305d2edca6214895e2a64c797
SHA1023242c50da29acc036a5e0b301ab9e1223f8634
SHA25690d6a122c0d60a6b4333a7148caef7623d6c7d34444de18874cd604f0cd80bc7
SHA5123eedf878ff2f5e2752d69c19810296fed3b5da9ed46308d34a05001639ce353f6666f46083f388fc4e56481557fae52fecb6e1ca1fc444163e9a40cc4844ecd1