Analysis
-
max time kernel
27s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 16:55
Static task
static1
Behavioral task
behavioral1
Sample
11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe
Resource
win10v2004-20220812-en
General
-
Target
11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe
-
Size
29KB
-
MD5
7cf60409e7500ebf687a8834f9adb465
-
SHA1
9950d39b3e4bdf7ea862e4f92f9e8c9577fc00e9
-
SHA256
11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2
-
SHA512
138a3c8a675aed4ae3173621f57c1c728dd20d16acdc09bcedb73fa384fbb940b47b84a13835595220dfaba92679c3a670553e566ee7a91d616e187a6a30b7ff
-
SSDEEP
768:f09zbo9NRL6sA00H3lhVRut/bJFXk3mSoK:fEbof8nNHlRMbJFXk3mSoK
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1560 WinHelp32.exe 1116 WinHelp32.exe -
Deletes itself 1 IoCs
pid Process 1916 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1116 set thread context of 1324 1116 WinHelp32.exe 30 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\WinHelp32.exe 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe File opened for modification C:\Program Files\Internet Explorer\WinHelp32.exe 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 284 wrote to memory of 1560 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe 27 PID 284 wrote to memory of 1560 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe 27 PID 284 wrote to memory of 1560 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe 27 PID 284 wrote to memory of 1560 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe 27 PID 284 wrote to memory of 1916 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe 28 PID 284 wrote to memory of 1916 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe 28 PID 284 wrote to memory of 1916 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe 28 PID 284 wrote to memory of 1916 284 11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe 28 PID 1116 wrote to memory of 1324 1116 WinHelp32.exe 30 PID 1116 wrote to memory of 1324 1116 WinHelp32.exe 30 PID 1116 wrote to memory of 1324 1116 WinHelp32.exe 30 PID 1116 wrote to memory of 1324 1116 WinHelp32.exe 30 PID 1116 wrote to memory of 1324 1116 WinHelp32.exe 30 PID 1116 wrote to memory of 1324 1116 WinHelp32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe"C:\Users\Admin\AppData\Local\Temp\11186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Program Files\Internet Explorer\WinHelp32.exe"C:\Program Files\Internet Explorer\WinHelp32.exe"2⤵
- Executes dropped EXE
PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\11186D~1.EXE > nul2⤵
- Deletes itself
PID:1916
-
-
C:\Program Files\Internet Explorer\WinHelp32.exe"C:\Program Files\Internet Explorer\WinHelp32.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵PID:1324
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD57cf60409e7500ebf687a8834f9adb465
SHA19950d39b3e4bdf7ea862e4f92f9e8c9577fc00e9
SHA25611186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2
SHA512138a3c8a675aed4ae3173621f57c1c728dd20d16acdc09bcedb73fa384fbb940b47b84a13835595220dfaba92679c3a670553e566ee7a91d616e187a6a30b7ff
-
Filesize
29KB
MD57cf60409e7500ebf687a8834f9adb465
SHA19950d39b3e4bdf7ea862e4f92f9e8c9577fc00e9
SHA25611186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2
SHA512138a3c8a675aed4ae3173621f57c1c728dd20d16acdc09bcedb73fa384fbb940b47b84a13835595220dfaba92679c3a670553e566ee7a91d616e187a6a30b7ff
-
Filesize
29KB
MD57cf60409e7500ebf687a8834f9adb465
SHA19950d39b3e4bdf7ea862e4f92f9e8c9577fc00e9
SHA25611186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2
SHA512138a3c8a675aed4ae3173621f57c1c728dd20d16acdc09bcedb73fa384fbb940b47b84a13835595220dfaba92679c3a670553e566ee7a91d616e187a6a30b7ff
-
Filesize
29KB
MD57cf60409e7500ebf687a8834f9adb465
SHA19950d39b3e4bdf7ea862e4f92f9e8c9577fc00e9
SHA25611186d4b765da5f84536cd0e5c5724d0783d10b8331d9bc4df43cc296ce1b3e2
SHA512138a3c8a675aed4ae3173621f57c1c728dd20d16acdc09bcedb73fa384fbb940b47b84a13835595220dfaba92679c3a670553e566ee7a91d616e187a6a30b7ff