Analysis
-
max time kernel
149s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe
-
Size
64KB
-
MD5
5f5992a67a3e687fdf4441ca5f232673
-
SHA1
39e5e5caec6974291009548c4e89d0a3b056d6f5
-
SHA256
8a9d8688033d06c8e398a4b5e6a7e1c05b550b66ac3bb4bc7120bf55fbc1b6e1
-
SHA512
21d7816b6e4665d0607b0a5d56d71c0dae79224710014d353619110c5b6cd4f4112569b990352d76edcb973b784d378b81318836e23c183adddc2edb6df31dcb
-
SSDEEP
1536:/Ao0zj2d6rnJYulBJnDQEEa1EfBE+1EC1p1encpkt9+FrJECOaAesJaEsHTP9ET+:/AoAliulHnDQEEa1EfBE+1EC1p1encpX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3196 wrote to memory of 2824 3196 5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe 83 PID 3196 wrote to memory of 2824 3196 5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe 83 PID 3196 wrote to memory of 2824 3196 5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\5f5992a67a3e687fdf4441ca5f232673.jaffacakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD501ed4cc6758795fd34fc3bb349a6c626
SHA167fcc1915fc0ffc5c3f320acd3ed23758d34083d
SHA25649bd1f2962c3faef35ec130695ef6dcc841d2514049816d29b582bffef3aa314
SHA5128b74abf81afc8eccc502d8394ff7e9c9bf7466fa0941559e135d3c973bddb8f33b4f446ecc46672caf0e140fb4d01b7a6a8e7bac1ed83aea0f06668d32fa798f