Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21/07/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
105acf69ed87bfcf03fe55758840e8b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
105acf69ed87bfcf03fe55758840e8b0N.exe
Resource
win10v2004-20240709-en
General
-
Target
105acf69ed87bfcf03fe55758840e8b0N.exe
-
Size
31KB
-
MD5
105acf69ed87bfcf03fe55758840e8b0
-
SHA1
032d54fe5e8ba72765e8293e1abe6f2cf19fc66f
-
SHA256
5c7ae91acfd1e2b7b1087561ec7f4a6a2d5369528260ada70a9326820cff5829
-
SHA512
236478e517233ff947ca50b7ca02ce275a43220e7092f2f9c8a8bc9a50f574eae3dd5b8fa6bd1dac3553cbd00479e2b95c4a0a6d868cb1eb3df3e55a851a1a24
-
SSDEEP
768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/N:e6q10k0EFjed6rqJ+6vghzwYu7vih9GC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3448 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3448 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 105acf69ed87bfcf03fe55758840e8b0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 105acf69ed87bfcf03fe55758840e8b0N.exe File created C:\Windows\HidePlugin.dll microsofthelp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 3448 4892 105acf69ed87bfcf03fe55758840e8b0N.exe 84 PID 4892 wrote to memory of 3448 4892 105acf69ed87bfcf03fe55758840e8b0N.exe 84 PID 4892 wrote to memory of 3448 4892 105acf69ed87bfcf03fe55758840e8b0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\105acf69ed87bfcf03fe55758840e8b0N.exe"C:\Users\Admin\AppData\Local\Temp\105acf69ed87bfcf03fe55758840e8b0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
PID:3448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5eed51b2b612e828c5c92cc8dfad1c876
SHA14b555632bf22a852d878deefdfcc379cd17490c9
SHA256a8d2c14203a3c6dc75a544ace191b3e487864005782880a86bd15ea78658a0a2
SHA512902e72b3c210cb20fe9447ce9aa095016d810680683e39f8c9d0200957cb531e47a7fb35a971fa8bd4ab61be28e62ef03d6934b6e3f87e6fce287d423b3a0a24