Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
593967e1851f76d47a322f86d2847f80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
593967e1851f76d47a322f86d2847f80N.exe
Resource
win10v2004-20240709-en
General
-
Target
593967e1851f76d47a322f86d2847f80N.exe
-
Size
43KB
-
MD5
593967e1851f76d47a322f86d2847f80
-
SHA1
d06f884a0172eabec140b9e2b5a3817c037e15f4
-
SHA256
5655cbcd0a261f21adcf314e1fef1562943c70ae303afbd812c2458f78ab7ff4
-
SHA512
623e68306235bd7eb4f13ef9a04de90c6849765165507489ff9b04aaf050af4f2efb749c3077b9ecdea9a9a36f27f380e0f65d4b14c9ad8c2e5752ab47c1ca37
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh5:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2836 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2836 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 593967e1851f76d47a322f86d2847f80N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 593967e1851f76d47a322f86d2847f80N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2836 2764 593967e1851f76d47a322f86d2847f80N.exe 30 PID 2764 wrote to memory of 2836 2764 593967e1851f76d47a322f86d2847f80N.exe 30 PID 2764 wrote to memory of 2836 2764 593967e1851f76d47a322f86d2847f80N.exe 30 PID 2764 wrote to memory of 2836 2764 593967e1851f76d47a322f86d2847f80N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\593967e1851f76d47a322f86d2847f80N.exe"C:\Users\Admin\AppData\Local\Temp\593967e1851f76d47a322f86d2847f80N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD530660356baccd8fbec3dab865c1a7d57
SHA1cf28cfb7cd0225fc08d1938b3619ab6b105b2372
SHA256ec8dea90494f507d754eae4c81bd4863a56f440a92d946de69c3d57b3f7a0f53
SHA5124a87c3eb13ce921072e594234c5c4111774c803b9b7c4351d892c48f1c9923b387a664a7ca1e5da2ceaee7c792776de6207761e50f9b45265c63e71c443e1740