Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe
Resource
win10v2004-20240508-en
General
-
Target
19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe
-
Size
33KB
-
MD5
e4274d0377cafbfb05335bb7ea810dbf
-
SHA1
c9dd814ab05da3d6cbcf20aa722a2614977e516f
-
SHA256
19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088
-
SHA512
dc26f569ebed11514de24424288c579b50f427fc5dab8151d7a5f3485912ee6467901fb63a53c7a87c69d6dd126aa0d99f3c84a663faebac0af4b30d38379cb4
-
SSDEEP
768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhn:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wYH
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
microsofthelp.exepid process 628 microsofthelp.exe -
Executes dropped EXE 1 IoCs
Processes:
microsofthelp.exepid process 628 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe -
Drops file in Windows directory 1 IoCs
Processes:
19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exedescription ioc process File created C:\Windows\microsofthelp.exe 19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exedescription pid process target process PID 2064 wrote to memory of 628 2064 19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe microsofthelp.exe PID 2064 wrote to memory of 628 2064 19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe microsofthelp.exe PID 2064 wrote to memory of 628 2064 19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe microsofthelp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe"C:\Users\Admin\AppData\Local\Temp\19230b6a853cdfd0b3b0663d8c0a7abcc55dc2bcc1e2f985f1bba6a1fb77b088.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4080,i,5711962389779687290,1245653010537220991,262144 --variations-seed-version --mojo-platform-channel-handle=4208 /prefetch:81⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5a65867d14740351aceb1f380d5d2427d
SHA1d07bf776558c85b090850c606458339546112d51
SHA256f40c3f100b3f6ea735f3c5481adb0dca3a0323463fc3bab0fce907f2e5821c5e
SHA51236498f96557a992edcc38e0a3a102c3ce10a86a93e737d6754867a357904a56b760da578d5d439bd50e0287f092c421e7afd8ec9c8a4835ed1771eaa2517aef3