Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
550f7130444dcc1720006e15d60f48e0.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
550f7130444dcc1720006e15d60f48e0.exe
Resource
win10v2004-20240611-en
General
-
Target
550f7130444dcc1720006e15d60f48e0.exe
-
Size
95KB
-
MD5
550f7130444dcc1720006e15d60f48e0
-
SHA1
84aafab9adb013c2cd2723d8aa4b3463726a7806
-
SHA256
819a2d4f6f5d4cf756d5502ac2f2a916aa55cece33a86400220afe25b82d3baf
-
SHA512
985f8b797e432a10b73cd1904b3c8426b173454b5661780ae788d4bb6e22009c01c6d92d94ea1af3c2cf834d6c4c9674b4accde4e06eaad0e6e4cbd90d8d036f
-
SSDEEP
1536:NDj2d6rnJbJnJBSX1nV1b1N1Il1k1YFI1x1J1MuEqx517Q/1T1Jzct01Nsqnl1Rc:FlnnJBSX1nV1b1N1Il1k1YFI1x1J1Muj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3892 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3892 microsofthelp.exe -
Loads dropped DLL 1 IoCs
pid Process 3892 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 550f7130444dcc1720006e15d60f48e0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 550f7130444dcc1720006e15d60f48e0.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3892 microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3892 2672 550f7130444dcc1720006e15d60f48e0.exe 83 PID 2672 wrote to memory of 3892 2672 550f7130444dcc1720006e15d60f48e0.exe 83 PID 2672 wrote to memory of 3892 2672 550f7130444dcc1720006e15d60f48e0.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\550f7130444dcc1720006e15d60f48e0.exe"C:\Users\Admin\AppData\Local\Temp\550f7130444dcc1720006e15d60f48e0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54c0b9970f96300dfa1f45afc7539d35f
SHA1ebbb4ed2003662d78d1f32e7b6da1b6f504ae711
SHA2564e96660cc8be7171a79755a20860366987547322b3a809e78c9850f14c242262
SHA512579f8787b52bf62a0296d8a24753263201fbc84abec5927033e3c97576f965ead0f8422acd3f7af1345b0df0001b0cd68fa971062e21269f6940cf3e1508ca88
-
Filesize
96KB
MD5f0afc3079773a18086b9af19002ce5ea
SHA1154fffb2cecaf0207fd265b4cfdd5dba0e6105a6
SHA25616f312d62f1d5123d830b7e645cfffa856e4ec28d4f7d217aedd5043bee98729
SHA512c735db38e06823863165b4e0eeb7268c5c24de7dfbb7ac7b5edb2976d5b3b6ccc6337551ed630af00940911032884ad4133eb28aa96530ba393f0305cd9cb018