Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe
Resource
win10v2004-20240412-en
General
-
Target
f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe
-
Size
30KB
-
MD5
07aeed9d19fbaa8e9bed9c6e25710506
-
SHA1
804b66592b99b6392824fc43fb70acc58d7b1d7f
-
SHA256
f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38
-
SHA512
c46e667ce1c0417218b8c84cf4c673000f46b0aac5588c73f067fa1f4f90cf9f6fee4804b9f6db3170661871f7ec78c09e6a66fac8a424c1128e4548159c3513
-
SSDEEP
768:OqPJtYA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EwhSahGCoh:Oq4A6C1VqaqhtgVRNToV7TtRu8rM0wYj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2244 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2244 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2244 2068 f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe 28 PID 2068 wrote to memory of 2244 2068 f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe 28 PID 2068 wrote to memory of 2244 2068 f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe 28 PID 2068 wrote to memory of 2244 2068 f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe"C:\Users\Admin\AppData\Local\Temp\f06711ff8284648db25874c853263d1d23bd12c388a2ebcccd2939066fe6eb38.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5a08eaf0df1ed02b9e87b995139f47faf
SHA1d6de988f14f8abe9aefecfe2f340119f60746eae
SHA256f437b629c57835fca90c842e69d3591abf1d9b6ab470f2ee984543b543f7cc8c
SHA512b47348e498d954f6a69eb0b9c137586ed4717cc802e8784b5aa04dfbfd2f54b88139074e0b47b93355b2b3d994a6a85f0d05fdcc2c1fae8512d7e3f3490bf505