Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:00
Static task
static1
Behavioral task
behavioral1
Sample
cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe
Resource
win10v2004-20241007-en
General
-
Target
cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe
-
Size
43KB
-
MD5
0192727f5d8627a78ece8895a2e83d86
-
SHA1
d896a9937f83cfd6d26027f7160af50bc34b2379
-
SHA256
cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4
-
SHA512
cdc1fa94ffde7efc51ed88b905794a6703699c0fdd6fe23a5a9a9685c418b59ea2ff64e4aae1b34e7ac08b1c6590d3fb6b8fbd2d55d1f75a52c4e7b72a4bd2fe
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/R:e6q10k0EFjed6rqJ+6vghzwYu7vih9G0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2300 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2300 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2300 2888 cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe 30 PID 2888 wrote to memory of 2300 2888 cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe 30 PID 2888 wrote to memory of 2300 2888 cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe 30 PID 2888 wrote to memory of 2300 2888 cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe"C:\Users\Admin\AppData\Local\Temp\cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD56e0f35a6fb5b4a8bea52e4a4b9e69c73
SHA1d8df29ea7cb39ff3e6ea71efb71406b81ea18490
SHA256cc2d51d3c2d65ed6f12b036eabfc9cb2a2fa5fe5cb23cc0052663a78c4b68593
SHA5127f543fa22c7780656b84bf1a7197a30608690b71bdf7403cea9712b663b351d1f51efe44f7de4cceb3642f31a924c9dac29ac20c6fe4baa7f2b9f4c3961e3ec9