Analysis
-
max time kernel
149s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
bd9f5854803f4eff5ea2d6af99521f83.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bd9f5854803f4eff5ea2d6af99521f83.exe
Resource
win10v2004-20240419-en
General
-
Target
bd9f5854803f4eff5ea2d6af99521f83.exe
-
Size
32KB
-
MD5
bd9f5854803f4eff5ea2d6af99521f83
-
SHA1
9c6cda84d29bcc5e8e2f97ece48b37e57d74d89f
-
SHA256
0453ec23cac17f0ac45cae699820e4a10dd422cbf5370aa2386c1ca734a1676b
-
SHA512
74821534328d9bf99ddffe3b56128f1d4d3320b480734b42bd85a37861a8ff18d7b8ff6509e20c5a4c403bc3fc66e88be157a6c2541a9aed0304cbe682486a6e
-
SSDEEP
768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhW:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wY2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2436 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2436 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" bd9f5854803f4eff5ea2d6af99521f83.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe bd9f5854803f4eff5ea2d6af99521f83.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4868 wrote to memory of 2436 4868 bd9f5854803f4eff5ea2d6af99521f83.exe 84 PID 4868 wrote to memory of 2436 4868 bd9f5854803f4eff5ea2d6af99521f83.exe 84 PID 4868 wrote to memory of 2436 4868 bd9f5854803f4eff5ea2d6af99521f83.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd9f5854803f4eff5ea2d6af99521f83.exe"C:\Users\Admin\AppData\Local\Temp\bd9f5854803f4eff5ea2d6af99521f83.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD52b58a95e5af7487d9249e0fb7081676c
SHA19f0c0653160fe17b28595fe7b45096c3057f7e77
SHA2562373b99a68db9dd4bc77cead2c16408ea85628deb66d96bb7d571b9a5352dbd4
SHA51233d4fc9540c375587942a447581f91d444a9d803e6a20814c3b62aeaba1d866c90121df6c53977e5bec6a8f0bd86697dfdea99609df408604b75f1d20be6b6bf