Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 21:52

General

  • Target

    4840816ab0990086daa6d1e71cdf731cbd7f8e727e73ab1daac490fb45d0c4fc.exe

  • Size

    39KB

  • MD5

    0dbdbd915a9723addc71ea5a0b6495ca

  • SHA1

    1cd03ccca7310f2c2c079705b55b40cfb2ca7f6b

  • SHA256

    4840816ab0990086daa6d1e71cdf731cbd7f8e727e73ab1daac490fb45d0c4fc

  • SHA512

    9c97722d4ab496e0a6e1f4b9fde741613f0759623c8599621f744af30a84e5336aabc10f67eabc302a2d8aad1168e6bd7e7546640c1e9bf6a52e23dd95f16eff

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4840816ab0990086daa6d1e71cdf731cbd7f8e727e73ab1daac490fb45d0c4fc.exe
    "C:\Users\Admin\AppData\Local\Temp\4840816ab0990086daa6d1e71cdf731cbd7f8e727e73ab1daac490fb45d0c4fc.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          39KB

          MD5

          e2ad70153c34b8529c47564388591a16

          SHA1

          0fbf15fed036aa4b5108273d6eaf8c30c1d04bc2

          SHA256

          db543ab2ae95831e301d3a60eeeb45f101b30566700d71fc741287fe763baa8a

          SHA512

          2d32c860e1b1d6a0b4918497aedbc9e9440cffed9349290ec0d9d1267696afa44068de05b08844ee2304eee8c9cab8b490de092f0f3fcb11a40b8fbbb712ce17

        • memory/2748-9-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/2876-0-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/2876-3-0x00000000001B0000-0x00000000001B3000-memory.dmp

          Filesize

          12KB

        • memory/2876-7-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB