Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 22:56
Static task
static1
Behavioral task
behavioral1
Sample
afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe
Resource
win10v2004-20240226-en
General
-
Target
afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe
-
Size
70KB
-
MD5
4f26c9462220d31f48aac4829e58c297
-
SHA1
6f677c05e21a2425f8ab7dac5f1c674a930c6826
-
SHA256
afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043
-
SHA512
1b07e667bf4b1a24128187944740b7c3a994468d83cd8a4bc30c860a189d7f8d18c28c20015de8c454695f820a1ff35a4fe203f2d2c9e7c1dfa92806fcced4ed
-
SSDEEP
1536:NDj2d6rnJbJnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nsqnl1RY:FlnnJBSX1nV1b1N1Il1k1YFI1x1J1MuX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2472 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2472 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2472 microsofthelp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2472 2292 afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe 28 PID 2292 wrote to memory of 2472 2292 afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe 28 PID 2292 wrote to memory of 2472 2292 afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe 28 PID 2292 wrote to memory of 2472 2292 afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe"C:\Users\Admin\AppData\Local\Temp\afd73c03119533d78e08cbaa12eaa536726a9ad639613d7b4809d454fb06f043.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD5e514ee990a0618acc635627518e4967d
SHA1ce85c9284fccc75a64b73a896f0eadc1e804f6bf
SHA25628d4a2e88c46a888a94544b5360f4e4d6c8ad86bfd1602ac962a63743c6d32c3
SHA5124db8703b16d3d02e7ec3ac8091ede075d36b1b06943ddd0ef0d3243703bb962e6ce7a465df6a3af5a4a1ccb81804060b38f9ea545bb8870bd9ace3da13ca5313