Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
bd8207eed383fdfd7552f6b6df35ca30N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd8207eed383fdfd7552f6b6df35ca30N.exe
Resource
win10v2004-20240709-en
General
-
Target
bd8207eed383fdfd7552f6b6df35ca30N.exe
-
Size
41KB
-
MD5
bd8207eed383fdfd7552f6b6df35ca30
-
SHA1
51c4b45ea057a004b4688c39b80747a7c9662bbe
-
SHA256
aca972d9f3d51ec7eac2504f3aae09d467179e67bcd8f39c949e4f79578f3804
-
SHA512
bf73e45adbb693aeb2a29a176917fb08f96044965f1b9d2d8943da1acb8d2cef51660ec2ff8fcce8a09950270ecaa408b5cef0c470fe2feb60d60e9edb0ce09a
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhs:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2524 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 2524 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" bd8207eed383fdfd7552f6b6df35ca30N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe bd8207eed383fdfd7552f6b6df35ca30N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2524 2064 bd8207eed383fdfd7552f6b6df35ca30N.exe 29 PID 2064 wrote to memory of 2524 2064 bd8207eed383fdfd7552f6b6df35ca30N.exe 29 PID 2064 wrote to memory of 2524 2064 bd8207eed383fdfd7552f6b6df35ca30N.exe 29 PID 2064 wrote to memory of 2524 2064 bd8207eed383fdfd7552f6b6df35ca30N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd8207eed383fdfd7552f6b6df35ca30N.exe"C:\Users\Admin\AppData\Local\Temp\bd8207eed383fdfd7552f6b6df35ca30N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5bdf1edbdcd6e6e86202c675d81c4a3bf
SHA198ddd64662e9f85186a3f79dc6f8b85432ae93d4
SHA256fc5023b7123b3682919c3569e9ef0f431e8bb125e3be81ac0d879e4671c19717
SHA5123232990108308dcbeddc568fb3046b095d6ff019862fd0375628d24f7c7d7dfe34a95ec91949b494adab4041249a7ec3e6cfb21fb3dea6b2be73f95054a852f0