Analysis
-
max time kernel
157s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe
Resource
win10v2004-20240226-en
General
-
Target
9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe
-
Size
22KB
-
MD5
0eaf2102dc644c48b7e74affbf9ff810
-
SHA1
bbfb9d6ca401349637f079f9c6ea9c1436caa6ba
-
SHA256
9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7
-
SHA512
c5a0bd79046540ea8fed0856ed51bba2acbd829a8ee2f09348cf7ae5f6bb3940a9231e5a943136159f2f06bc71a4717ada00a4bbfb5a624a75af284ae1f2e776
-
SSDEEP
384:KICKqPF/EkecA6C1VqahohtgVRNVdoV7TtRu8rM/dWwYVFl2g5coW58dO0xXHV2n:7qPJtecA6C1VqahohtgVRNToV7TtRu8i
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5908 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 5908 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5628 wrote to memory of 5908 5628 9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe 98 PID 5628 wrote to memory of 5908 5628 9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe 98 PID 5628 wrote to memory of 5908 5628 9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe"C:\Users\Admin\AppData\Local\Temp\9f1b0982140fc295b7e3aa25946d4feb12b8da3049b23393e5b9978d88554fc7.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5628 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3992 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:5188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5023657904a919f8fa87f0a349781c37a
SHA1e4aa1ccbb94f90b8e7e81bc32951b28dc5696b7c
SHA256455ce43c813802e323a6ebeff01d29303f86979ffbf67c7e2f2968e92797d4f7
SHA512825119e033681d94d19a3d2bd7a5f9e55d00b78f56bdc6a69970c4c45f8cb0d49e5cbf73a5b1f85c536d571c48d0dd6345b1094876c0ef0741e8eb4f685ee27d