Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 03:52
Static task
static1
Behavioral task
behavioral1
Sample
e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe
Resource
win10v2004-20240704-en
General
-
Target
e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe
-
Size
51KB
-
MD5
3ba7b9008fcea4f292c633d2d52c4805
-
SHA1
3543bf49511e577b51d78eba0f95b346aca3b26e
-
SHA256
e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651
-
SHA512
077b7320b73089c371cbcd411c54afc342d2ebd9856d8c48eb9b655a951e7c5ae4d856ad41e8f07cabc5f1c379baef1742a5c1d38fc8bc99af928e4cf304cae9
-
SSDEEP
768:l6wTz/A7805pqiHZplRRqpd6rnxnwwxKscWoruXMM32PvsgTmPvhW:NAo0Tj2d6rnJwwvl4ulkvsgTmPvhW
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2084 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2084 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2084 2496 e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe 30 PID 2496 wrote to memory of 2084 2496 e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe 30 PID 2496 wrote to memory of 2084 2496 e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe 30 PID 2496 wrote to memory of 2084 2496 e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe"C:\Users\Admin\AppData\Local\Temp\e22ac2a878722c75b621cebfc24647845b72b4ca6b042b55e874153c01a1e651.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD51e04e2b18dab81632b3de084ae096258
SHA180b6177e02bbd44dfd05f2b6606648cbb49b4e05
SHA2564d4037ac45903f2c975dca559e0162eafa74ff4a9ea2a577350cd073edb7d72e
SHA5121a3ef1d7796983f17bd6016218b5099b0b69e20632889d0d2addce5a456ba642c4ab59eb49cd29bb81a00569db7bd210ef54509d8f76f20708c916c801e118bd