Analysis
-
max time kernel
147s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 18:11
Static task
static1
Behavioral task
behavioral1
Sample
3b5572209140dda6a53844d5b2568dd9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3b5572209140dda6a53844d5b2568dd9.exe
Resource
win10v2004-20231215-en
General
-
Target
3b5572209140dda6a53844d5b2568dd9.exe
-
Size
85KB
-
MD5
3b5572209140dda6a53844d5b2568dd9
-
SHA1
5530cb8fc615f28e54894b23ce5a79e2cce65544
-
SHA256
fda9f28bf941edd588e6bd2939d70fddf8295f3ea94b61af9add09819c0db60b
-
SHA512
772982adc118f313f3ea4d1d700a78cbe0515d3aab56153203c3da8a706a045f9e9ba0bb12bf9c7a44b5744ac3dff85bbffdb4fc70e1dfb6bd444fada8155064
-
SSDEEP
1536:/Ao0zj2d6rnJYulBJnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nv:/AoAliulHnJBSX1nV1b1N1Il1k1YFI1I
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1956 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1956 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 3b5572209140dda6a53844d5b2568dd9.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 3b5572209140dda6a53844d5b2568dd9.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1956 2300 3b5572209140dda6a53844d5b2568dd9.exe 15 PID 2300 wrote to memory of 1956 2300 3b5572209140dda6a53844d5b2568dd9.exe 15 PID 2300 wrote to memory of 1956 2300 3b5572209140dda6a53844d5b2568dd9.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b5572209140dda6a53844d5b2568dd9.exe"C:\Users\Admin\AppData\Local\Temp\3b5572209140dda6a53844d5b2568dd9.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5645d9ac51231063f27e06182822d5711
SHA188dc1b512e3b7337330b9a01e8225f6333fd762d
SHA25623fa9a4ac03535852327ee24a0e5d5285cf46f7910215ecfe50babff805f1ccc
SHA5121938b9f491321b6abe546c958f6125da52206bcf22966b8f1bee813a4e48eb65efee5912df283ed894d76b56a43a97625f8a003ed6747f2951516903788ecbf4
-
Filesize
1KB
MD55e43ce4a8c59061926435057a481ad24
SHA1f516604cc7faf14abbad12657ce6c93c29a93224
SHA256e9c6291fed9ddf4ae0d0dd2c15350b33642b05ae0d9c9ff09766063eaeb63fb9
SHA512f80d984a5739d1fc33893dc4144095c8d96b9dc454edf53a958d61a8edf77ea4cb629e0018ff4a46c48ea7b015e20c89f5e427b0c70ffcec195b8a05163d89fe