Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03-07-2024 03:37
Static task
static1
Behavioral task
behavioral1
Sample
34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe
Resource
win10v2004-20240611-en
General
-
Target
34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe
-
Size
40KB
-
MD5
04f4f48f9674fa3d3645d2b8c9ddfb10
-
SHA1
d19c2bce3c02de53c842c85e8a0a2cd6d70a6c0b
-
SHA256
34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b
-
SHA512
cc41407c6f33f37e4f77476a2b34ae1382b4c4f7dc737de956c40f180337126debb0e1669d9634b1b1ae6e5e9bb60c2034512acecdaaf0579373aa58deb35435
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhS:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYy
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2792 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2792 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2792 1364 34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe 28 PID 1364 wrote to memory of 2792 1364 34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe 28 PID 1364 wrote to memory of 2792 1364 34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe 28 PID 1364 wrote to memory of 2792 1364 34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe"C:\Users\Admin\AppData\Local\Temp\34d003c9af1e3e149c2edcb2343671616f129095aae76e3a6a2a887197c9439b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD51449f1f4b9ce37b1306e0f929e1f2303
SHA162222ad0394a3722dff3fd9597e9971706cd578d
SHA25645e1071377cc418474b02808b9686725e49a51e0fe8b8ab1588d34e7b61b9eb0
SHA5129c8354061cb337d26cc77cd0b6adb70bce30ba7b56193f5acc1c38a95d33abe7e382d1765478dd0119c341dc59199d6875219a7747e88b667954eb352a50d5ac