Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 22:26
Static task
static1
Behavioral task
behavioral1
Sample
63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe
Resource
win10v2004-20240226-en
General
-
Target
63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe
-
Size
76KB
-
MD5
bb094b8cbf6016d5a0ef8e20178effdc
-
SHA1
ca92c964cc0abe90c25606529045031e24e26485
-
SHA256
63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7
-
SHA512
8ac5fcd5ed80301eb2a01ab771cc71068406882458e2da32d8c64c657a8cce720ee57de27ccac47862d4dee3244006bc6cde73f0d306689b75846619d5e2f7c7
-
SSDEEP
1536:NDj2d6rnJbJnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nsqnl1R1:FlnnJBSX1nV1b1N1Il1k1YFI1x1J1MuW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2112 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2112 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2112 microsofthelp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2112 2416 63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe 28 PID 2416 wrote to memory of 2112 2416 63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe 28 PID 2416 wrote to memory of 2112 2416 63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe 28 PID 2416 wrote to memory of 2112 2416 63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe"C:\Users\Admin\AppData\Local\Temp\63f7c89ac7b39cf1dc153890cabcdc420968d0a26a759fc23280c1fa535ffbd7.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD591cff5388612fc417e03eddb5ea4dc4f
SHA1877d884e2ddab146a771af193a112dfb98a7b3fb
SHA256b7061e11aef4219ef888229de4d561023632a6eaf6dd6c06fcf3ce5ea0bb70eb
SHA5125835118111a57764891ba1e7078b11fc0096553d5c35c404a9fdc5ee4a14ac12e7330d7bc6739e1fc00ca32534270c428e70d23cf267e8a821d4fcf048752c42