Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-07-2024 09:49
Static task
static1
Behavioral task
behavioral1
Sample
032c83a31cde978f82d7590b8ade0ed0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
032c83a31cde978f82d7590b8ade0ed0N.exe
Resource
win10v2004-20240704-en
General
-
Target
032c83a31cde978f82d7590b8ade0ed0N.exe
-
Size
37KB
-
MD5
032c83a31cde978f82d7590b8ade0ed0
-
SHA1
5c02fd1f7edcd8d91168fddf06bd98f8e5d85009
-
SHA256
26788a78d5e0ac8d40dc526aa38257522d346723a0074facb5d0d2266c39f736
-
SHA512
b51dd8dc856134543c3f00c964cae5e1a94c07985d422bdf0c6ceadd6ca34dcab0a90573de8b7f5d992f2506092540257f1fbd6d19907d3c80fabd719dac00d9
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhP:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1880 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1880 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 032c83a31cde978f82d7590b8ade0ed0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 032c83a31cde978f82d7590b8ade0ed0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1880 2152 032c83a31cde978f82d7590b8ade0ed0N.exe 28 PID 2152 wrote to memory of 1880 2152 032c83a31cde978f82d7590b8ade0ed0N.exe 28 PID 2152 wrote to memory of 1880 2152 032c83a31cde978f82d7590b8ade0ed0N.exe 28 PID 2152 wrote to memory of 1880 2152 032c83a31cde978f82d7590b8ade0ed0N.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\032c83a31cde978f82d7590b8ade0ed0N.exe"C:\Users\Admin\AppData\Local\Temp\032c83a31cde978f82d7590b8ade0ed0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD52113143c9609ffceb6262b1c2fa27c54
SHA12912d0975ac19377e7746e1fd5008c9ff264ada9
SHA256f2f410e4ae869e17e6354484b3cc171f22675fb1ed7c2e7db204f76d54f98771
SHA51219a554e4920370b8a2458c357683bd708d9aad6536e178cd4936098b12d1622e68d1d597cc4fbd792afb240c83711e10b062b02e54a82c48b5f5cd1edeba896e