Analysis

  • max time kernel
    149s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 22:45

General

  • Target

    0ea31bb871f95391cef0f7a8d430b810N.exe

  • Size

    51KB

  • MD5

    0ea31bb871f95391cef0f7a8d430b810

  • SHA1

    6838faeb9d07320e1d905475699d9b8699c5fb9e

  • SHA256

    d4e24e35de475a230ef804d6c8e4a0ddd457f2f75609b787a5dca09f5e7ddd55

  • SHA512

    ce7fd1d69c3928fc66c25fd1fe181aa277868f63eb6b14919f0f6b54d3f09bf731fa1ae68c9985a2caec20cf930c9c557f773e6ef0c513518157549ee4649f0d

  • SSDEEP

    768:N6wTz/A780gpqiHZplRRqpd6rnxnwwxKscWoTlxifivs+P6hh2VsEI:lAo0ej2d6rnJwwvlKlIUBP6hh2VsEI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ea31bb871f95391cef0f7a8d430b810N.exe
    "C:\Users\Admin\AppData\Local\Temp\0ea31bb871f95391cef0f7a8d430b810N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    51KB

    MD5

    86157094201fc828b2625f60405770a7

    SHA1

    d340c62ee9d24e3ebedcb77adc3c2c2686c0a7c0

    SHA256

    b2cf2cf21fcda15f2c606e2ef7e554573055d8c9bf031819fc5f67d56893e622

    SHA512

    becc882909d6690bf0c1a9956dfe78ea8bf99d42a52ef01477d0880e5df9fc5e91d20e7f965f38c4659d1c26b9e30fdc739e6a872e9992ce766e7a95e4e69736

  • memory/1324-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2476-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2476-4-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB