Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe
Resource
win10v2004-20240226-en
General
-
Target
f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe
-
Size
105KB
-
MD5
faa8bde03822e83ed62c2075f4b68006
-
SHA1
7d29efd8a1617bd7896d44aeb3f776fe795e76b2
-
SHA256
f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8
-
SHA512
ce92d364b990c5890ef47c44df583d50db7c875615a0ab5f0b2bf429fc482eb0ffa8fc91423d7490b1f5e31c8286e23533670b56640a5bbe6f18e99a6a5a4da9
-
SSDEEP
3072:YAowyFgjTiUkEwt6OlvaeEpIaCtwUaSvcmGCCCCCCC+EaEAEtHjCCCCt6Hatbcan:PJjGUkfUL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2936 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2936 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2936 2872 f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe 28 PID 2872 wrote to memory of 2936 2872 f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe 28 PID 2872 wrote to memory of 2936 2872 f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe 28 PID 2872 wrote to memory of 2936 2872 f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe"C:\Users\Admin\AppData\Local\Temp\f456fb26d723cdbc4be3aeedb6bf6693812265b77e9ef7cab5ee1446c8d38ff8.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5ad7859784547a8d42322dc95f716fc5f
SHA18db1d418fc3991ca7e7a6cdfe7f0732d39ad85e3
SHA25667c08441e695860d28e5b72ede876dc6646d2bcab315891fe25a4571632baee2
SHA5123a9e92fbe3985a5c338cad21830c544c43823f1bf990490c955a407db42bada895010096a5e82e997d06b8f41f8ceb61a11853e88e34e749c11fb4ff162738d6