Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
3c22c4b44651f608bc4ae353cfc07580N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c22c4b44651f608bc4ae353cfc07580N.exe
Resource
win10v2004-20240709-en
General
-
Target
3c22c4b44651f608bc4ae353cfc07580N.exe
-
Size
41KB
-
MD5
3c22c4b44651f608bc4ae353cfc07580
-
SHA1
53eee18c81ad63711aa1ae481a8908593d457802
-
SHA256
aecbbf0e36bbca58f6b2c5f70d20ac5cedc407576c55039f30dc242c8f671f15
-
SHA512
e1c6e092e5950ff9c05318112bdd6f38571519567d624fbf6a3c20f2ce7e138c38e730e654afb23b2a1cce3e9541f6a9eeb01d3db02712164ddc067437e5ff93
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhu:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYO
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2380 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2380 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 3c22c4b44651f608bc4ae353cfc07580N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 3c22c4b44651f608bc4ae353cfc07580N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2380 1700 3c22c4b44651f608bc4ae353cfc07580N.exe 30 PID 1700 wrote to memory of 2380 1700 3c22c4b44651f608bc4ae353cfc07580N.exe 30 PID 1700 wrote to memory of 2380 1700 3c22c4b44651f608bc4ae353cfc07580N.exe 30 PID 1700 wrote to memory of 2380 1700 3c22c4b44651f608bc4ae353cfc07580N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c22c4b44651f608bc4ae353cfc07580N.exe"C:\Users\Admin\AppData\Local\Temp\3c22c4b44651f608bc4ae353cfc07580N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5ebcca4e5a3d12fa935732a4858783941
SHA160fbf7b485b7d0c27dd2372cd9f5c2a804a45a46
SHA25600a9dc49cf67d60ee9197e2ca36aa070ff4bfe63ee0f237512712c96c2f00cfa
SHA5126046f4a81cef6bcbc97b130c7e8d9f193bfbcfd07ec562289ebc556657b4d767a7f3bf9f50b545d0a558dd53f0d769716210321b46f016684c3532eb79a8acf1