Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 01:22

General

  • Target

    a4adf580b079ecc006ba5ca39c3dbb4759b8afb73126eb9b511a08c41961b6bc.exe

  • Size

    25KB

  • MD5

    17cf4edbfca45997704b0d488024b621

  • SHA1

    1f823dd17241c94dfc50b86992bbab3822fd5f3b

  • SHA256

    a4adf580b079ecc006ba5ca39c3dbb4759b8afb73126eb9b511a08c41961b6bc

  • SHA512

    96c2a947688fe50b72c7bdfba2e592d2aa5836c1d20ca843e03cd24e9d2aac3bef87e63c793dbb0d83e39423423d193204763358ac07b15fb5379455066515cd

  • SSDEEP

    768:7qPJtecA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdOTW:7q+cA6C1VqaqhtgVRNToV7TtRu8rM0wq

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4adf580b079ecc006ba5ca39c3dbb4759b8afb73126eb9b511a08c41961b6bc.exe
    "C:\Users\Admin\AppData\Local\Temp\a4adf580b079ecc006ba5ca39c3dbb4759b8afb73126eb9b511a08c41961b6bc.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    26KB

    MD5

    5a3ce79b6c1ae7a0b23387bb3cb25161

    SHA1

    4f48649b7e3211983e4d2c8dbf16603727e9fb27

    SHA256

    45da75d269e60c02515e304182cc5caaa935fe0a8b9cef8115e1aacb6d508af5

    SHA512

    2121ead2f47b2b0ce3bfef5017e89134164d3d678b4964c00131d714479c2707bb2f25ae96131b1f4d692525953267d143cd4bc8b9cd805ae06b55bd4d058003

  • memory/2660-0-0x0000000000400000-0x0000000000402000-memory.dmp

    Filesize

    8KB

  • memory/2660-6-0x00000000002A0000-0x00000000002A2000-memory.dmp

    Filesize

    8KB