Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe
Resource
win10v2004-20240419-en
General
-
Target
8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe
-
Size
32KB
-
MD5
ef66e2b9e98c0eb74d95fe0c4466d3a0
-
SHA1
dff9d1948b760cd15f12a95ed8a7b4611938ee9d
-
SHA256
8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0
-
SHA512
0142a24800af20526ff7b8c604369d3b3a16095b4dfbbce509dbcf2e6892c723bd255190513a8ec02d88f2e93a5f1d8ef0d70bf6d53c94840bdacb58fbb2957e
-
SSDEEP
768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh8:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wYc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2268 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2268 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3064 wrote to memory of 2268 3064 8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe 86 PID 3064 wrote to memory of 2268 3064 8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe 86 PID 3064 wrote to memory of 2268 3064 8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe"C:\Users\Admin\AppData\Local\Temp\8182514344f095dcf8d3baf66f781c40270d3eba74f8a6a202423965d0a7d2d0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD59cd6f8c16ec876890e416589788fc834
SHA1076a11010dfa8c9e668620c4d4a1f7d0f4978297
SHA2563720bff8615d6c3633b5ab7a503ab9e9c18949302164326133856466707d98a0
SHA5127af9fe67bc2b49c119cf1a7b82417f68122454c34e57760012d9c6424db67363047df63d4980d88fe4e3dc7a97ebb27005deed654da5ee2d26b7923a04c4c91e