Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe
Resource
win10v2004-20240508-en
General
-
Target
ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe
-
Size
30KB
-
MD5
0b149ef90851530c1021e5f73482a8a3
-
SHA1
f85ed3db2a480d2d01225da57d870b68d182a045
-
SHA256
ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4
-
SHA512
032536a2c9195c99d9004efcc22850e7257c07df1f4edc2a6342b150426a2340b6006b2cb60e159d0ea68343978d26ae9416dc7cd10d71a28e8e346702fa97f9
-
SSDEEP
768:/qPJtUA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKhJJhgcz:/q0A6C1VqaqhtgVRNToV7TtRu8rM0wY4
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2408 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2408 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 780 wrote to memory of 2408 780 ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe 28 PID 780 wrote to memory of 2408 780 ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe 28 PID 780 wrote to memory of 2408 780 ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe 28 PID 780 wrote to memory of 2408 780 ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe"C:\Users\Admin\AppData\Local\Temp\ff080dabec023e03a9f746519cb53877f92da20e114d7ce6b7e16c17126e3da4.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5becdcd97c44b010dd153ee862187f9bf
SHA1279953b58ddc12f6a87c9b798a61570e68a22e79
SHA256eee5e712de056f8e132cc9c38054bdfa9f251c9342d762c4b395316929142959
SHA5127c85cd6708b187238dcb739995eedff1c8d255b935e62ab1247f8d9891b65eed42d432b605c0e56b1d70d0574ddc3ccbe19b960c3a08b0bd290efd32b2ee7f09