Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe
Resource
win10v2004-20240226-en
General
-
Target
cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe
-
Size
97KB
-
MD5
177d956afa59dabab82bd23ef148840a
-
SHA1
4845380543d3a0eea3626c654b584e6339c06090
-
SHA256
cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd
-
SHA512
983bdd8c0b363b39f6b59582b7db72cb67050aecdecb159e68acdf06425332f6471d987a757662074f658d2652c34c6363a4fae118b542f16b32a3a07efd308d
-
SSDEEP
3072:/AoAliulHnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nbnl1RRhCo:4SAw65
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3024 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3024 2340 cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe 28 PID 2340 wrote to memory of 3024 2340 cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe 28 PID 2340 wrote to memory of 3024 2340 cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe 28 PID 2340 wrote to memory of 3024 2340 cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe"C:\Users\Admin\AppData\Local\Temp\cd80a53738f4bc8b3782394e1fcd9f704e9b58388a114740bb94532ead9fb0cd.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD590d27e2a00ff21402416bd7104e3e860
SHA12c1a9fb025fc86995301ed8be133afe6bd1fc6e7
SHA25667ea1444f894bf44bfd16776e864a693d3bfe392783a5ba029c14410b0faddde
SHA512a9cb04a827b0efe78ac585b5bdcf4f58b6ca489fdb3699c6af9778478419b7195739e08306b89898e702159a183773775ef318ec5946d2101ad9de193c603732