Analysis

  • max time kernel
    119s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 21:13

General

  • Target

    105acf69ed87bfcf03fe55758840e8b0N.exe

  • Size

    31KB

  • MD5

    105acf69ed87bfcf03fe55758840e8b0

  • SHA1

    032d54fe5e8ba72765e8293e1abe6f2cf19fc66f

  • SHA256

    5c7ae91acfd1e2b7b1087561ec7f4a6a2d5369528260ada70a9326820cff5829

  • SHA512

    236478e517233ff947ca50b7ca02ce275a43220e7092f2f9c8a8bc9a50f574eae3dd5b8fa6bd1dac3553cbd00479e2b95c4a0a6d868cb1eb3df3e55a851a1a24

  • SSDEEP

    768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/N:e6q10k0EFjed6rqJ+6vghzwYu7vih9GC

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\105acf69ed87bfcf03fe55758840e8b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\105acf69ed87bfcf03fe55758840e8b0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:3448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    32KB

    MD5

    eed51b2b612e828c5c92cc8dfad1c876

    SHA1

    4b555632bf22a852d878deefdfcc379cd17490c9

    SHA256

    a8d2c14203a3c6dc75a544ace191b3e487864005782880a86bd15ea78658a0a2

    SHA512

    902e72b3c210cb20fe9447ce9aa095016d810680683e39f8c9d0200957cb531e47a7fb35a971fa8bd4ab61be28e62ef03d6934b6e3f87e6fce287d423b3a0a24

  • memory/3448-6-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4892-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4892-4-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB