Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe
Resource
win10v2004-20240426-en
General
-
Target
952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe
-
Size
86KB
-
MD5
0724f3182bff2054686595bbf4910f9d
-
SHA1
cecc6d0d1014aa8f2c8fc723c5683ff9c5e502f9
-
SHA256
952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775
-
SHA512
eaa9e036673e1a28c50b4b397d248d15b4e46ca07bb6ba60e9a3c0f0ac59ed6ecc7171f317f64a272a3684a225b50135ebb64ffe1e13e4426799d13e9f364df5
-
SSDEEP
1536:NDj2d6rnJbJnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nsqnl1Rf:FlnnJBSX1nV1b1N1Il1k1YFI1x1J1MuQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1668 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\HidePlugin.dll microsofthelp.exe File created C:\Windows\microsofthelp.exe 952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1668 microsofthelp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1668 1032 952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe 28 PID 1032 wrote to memory of 1668 1032 952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe 28 PID 1032 wrote to memory of 1668 1032 952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe 28 PID 1032 wrote to memory of 1668 1032 952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe"C:\Users\Admin\AppData\Local\Temp\952013abd7b6b54487eb008c035539ad0e6843e2dec6a3f603ebf4cb35244775.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5899cd88f83aa87b92da4d8d62c2d197e
SHA116d1cbda8dfe37ee6c0de805ddc53938b9a3c7eb
SHA2566e2d5d235559938a495b849af4f07f27463786448670d60c9c5995a01a8d1a35
SHA512b36af6b802e078981b15cd39f9d1342faeb0aecd0001433c4f54617afb4e0d8afaed1e0786daff8da4af62ea4d7f1cefe68d4f30cf139cecef40fa23eb10ffff