Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 23:16

General

  • Target

    3c22c4b44651f608bc4ae353cfc07580N.exe

  • Size

    41KB

  • MD5

    3c22c4b44651f608bc4ae353cfc07580

  • SHA1

    53eee18c81ad63711aa1ae481a8908593d457802

  • SHA256

    aecbbf0e36bbca58f6b2c5f70d20ac5cedc407576c55039f30dc242c8f671f15

  • SHA512

    e1c6e092e5950ff9c05318112bdd6f38571519567d624fbf6a3c20f2ce7e138c38e730e654afb23b2a1cce3e9541f6a9eeb01d3db02712164ddc067437e5ff93

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhu:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c22c4b44651f608bc4ae353cfc07580N.exe
    "C:\Users\Admin\AppData\Local\Temp\3c22c4b44651f608bc4ae353cfc07580N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2380

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          42KB

          MD5

          ebcca4e5a3d12fa935732a4858783941

          SHA1

          60fbf7b485b7d0c27dd2372cd9f5c2a804a45a46

          SHA256

          00a9dc49cf67d60ee9197e2ca36aa070ff4bfe63ee0f237512712c96c2f00cfa

          SHA512

          6046f4a81cef6bcbc97b130c7e8d9f193bfbcfd07ec562289ebc556657b4d767a7f3bf9f50b545d0a558dd53f0d769716210321b46f016684c3532eb79a8acf1

        • memory/1700-0-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/2380-7-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB