Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe
Resource
win10v2004-20240419-en
General
-
Target
4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe
-
Size
88KB
-
MD5
9a0318a1626cb9a72a77a5e4c25d8c19
-
SHA1
a1b706ae93c97a43d75903e0ae5cc8c9972ddb65
-
SHA256
4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463
-
SHA512
69a8bcc189995fbd97072bbc45d779601bff15dd5805f83580c8b29eaa7716527c866900e570c459dd809e7085e2cc95ddf9905d9daf00cac21754bbadd17a05
-
SSDEEP
1536:vAowfbJFgjQ284U+w2EwRz/IUqX514n2222n2n2LIEHuIUH7NOE965UfJ6n56YSw:vAowVFgjQiUkEwt/XqX514n2222n2n2j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2724 1664 4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe 28 PID 1664 wrote to memory of 2724 1664 4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe 28 PID 1664 wrote to memory of 2724 1664 4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe 28 PID 1664 wrote to memory of 2724 1664 4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe"C:\Users\Admin\AppData\Local\Temp\4233871c7f18d7044e517d295983685a89dc03c4154415f9a81488fd50252463.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5b3e6bce38a064ed0bc3aced4f6a69ee7
SHA19f7f11db6dc16bad6a5a585e91edb1e5f72235ff
SHA256a6078695fc7bff296a805541f04744558a087c23adb2d5a791a9a94870309852
SHA512fdacb314d9df52f81c9e5b068324066b7b1b5083411af7b5a12a644a0502435b412366faac1111a0bca1d5d1e1029a9fb43e51c859dd111eb205fa0e015c81bc