Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe
Resource
win10v2004-20240508-en
General
-
Target
f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe
-
Size
79KB
-
MD5
7379fc3cc38d174f7b257e8e4661517a
-
SHA1
d14537143e8c700a87454d7d20c8251bf5d9494b
-
SHA256
f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2
-
SHA512
57f19af2b3ae42a52868452a6718fc41ddabb739bb0048e519a93b80a35d14a92305c44c67686f38e7f47583016e84be40cbc55f8d5f6e409e88ce5fd5443fb9
-
SSDEEP
1536:NDj2d6rnJbJnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nsqnl1RB:FlnnJBSX1nV1b1N1Il1k1YFI1x1J1Mui
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1980 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1980 microsofthelp.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1980 1876 f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe 80 PID 1876 wrote to memory of 1980 1876 f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe 80 PID 1876 wrote to memory of 1980 1876 f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe"C:\Users\Admin\AppData\Local\Temp\f7fe54141c2c82af7efbd7e7485aebfb50227b120ab3d422d9c4b62087770cd2.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54c0b9970f96300dfa1f45afc7539d35f
SHA1ebbb4ed2003662d78d1f32e7b6da1b6f504ae711
SHA2564e96660cc8be7171a79755a20860366987547322b3a809e78c9850f14c242262
SHA512579f8787b52bf62a0296d8a24753263201fbc84abec5927033e3c97576f965ead0f8422acd3f7af1345b0df0001b0cd68fa971062e21269f6940cf3e1508ca88
-
Filesize
79KB
MD5fa26118171ae0673d1b85f41bfaec294
SHA1a1e339e8c39354e44fc01317090d258ab7a1e3cb
SHA2567330b75a44edb65d165eeca3886a4b6dc884be21af2aceb946221ba2e3a6b321
SHA5129a015304cc665796490339ea7387f78589672cd18655c64f3dc44e182ec45e5999d37338e29824ed0b91b9dcc8307d27bf73491238eb8bb71ac876b3758bfa9b