Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe
Resource
win10v2004-20240704-en
General
-
Target
8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe
-
Size
40KB
-
MD5
799e4bf97436a505d3c9412742aca700
-
SHA1
a7a441e30b57f256c21c2e2d11e840369d4db0c2
-
SHA256
8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20
-
SHA512
fe35d4655751c626791ba8cfe892d04ed18a6d25435b868415eaed77c4c943c04689e469bccce32abb929a063cd5780c1b904bbe144b8a8de030f6dd7e864ea7
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhr:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 848 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 848 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 848 3044 8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe 30 PID 3044 wrote to memory of 848 3044 8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe 30 PID 3044 wrote to memory of 848 3044 8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe 30 PID 3044 wrote to memory of 848 3044 8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe"C:\Users\Admin\AppData\Local\Temp\8fbac78153a82027f927a25487509b08063cac3aed41da7dcc44e6801b564a20.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5cb0531d697161e421a5e4a0b48e22de0
SHA148a1347c84f166138ac4ba82affbe99dba55fea2
SHA256591805bea3569d06879ffb4f423efa1e146869ab7b7745b11f609e011ff75334
SHA5123f4c3216a62c151af9d3b314a2b26c0fb1516bfd5b0a58c9b2bdb5dec58c1c0fee92cfc072a7b6153654a430777294c3d2c039e17a930a6abf309858c54ec36a