Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 05:02

General

  • Target

    f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe

  • Size

    105KB

  • MD5

    faa8bde03822e83ed62c2075f4b68006

  • SHA1

    7d29efd8a1617bd7896d44aeb3f776fe795e76b2

  • SHA256

    f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8

  • SHA512

    ce92d364b990c5890ef47c44df583d50db7c875615a0ab5f0b2bf429fc482eb0ffa8fc91423d7490b1f5e31c8286e23533670b56640a5bbe6f18e99a6a5a4da9

  • SSDEEP

    3072:YAowyFgjTiUkEwt6OlvaeEpIaCtwUaSvcmGCCCCCCC+EaEAEtHjCCCCt6Hatbcan:PJjGUkfUL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe
    "C:\Users\Admin\AppData\Local\Temp\f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2936

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          106KB

          MD5

          ad7859784547a8d42322dc95f716fc5f

          SHA1

          8db1d418fc3991ca7e7a6cdfe7f0732d39ad85e3

          SHA256

          67c08441e695860d28e5b72ede876dc6646d2bcab315891fe25a4571632baee2

          SHA512

          3a9e92fbe3985a5c338cad21830c544c43823f1bf990490c955a407db42bada895010096a5e82e997d06b8f41f8ceb61a11853e88e34e749c11fb4ff162738d6

        • memory/2872-0-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2872-6-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2936-8-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB

        • memory/2936-10-0x0000000000400000-0x0000000000410000-memory.dmp

          Filesize

          64KB