Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
7c3b8fba9effae690dbef5d5e5fb56e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c3b8fba9effae690dbef5d5e5fb56e0N.exe
Resource
win10v2004-20240709-en
General
-
Target
7c3b8fba9effae690dbef5d5e5fb56e0N.exe
-
Size
40KB
-
MD5
7c3b8fba9effae690dbef5d5e5fb56e0
-
SHA1
4185551d634c4361776aaa68521192f679988ec1
-
SHA256
872950909acaab493f2e1d249afd9eea556c568eb9d6603dd0e8c9d07d194687
-
SHA512
96201d7a018a0c1b802d24207dee48d8b0950d9605904e7a1fa951a8c16c69fc83711208d2f2f9b3eacc11536ae60027d5c336605975a61e9cd718abe8f96191
-
SSDEEP
768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhj:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3136 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 3136 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 7c3b8fba9effae690dbef5d5e5fb56e0N.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 7c3b8fba9effae690dbef5d5e5fb56e0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1760 wrote to memory of 3136 1760 7c3b8fba9effae690dbef5d5e5fb56e0N.exe 84 PID 1760 wrote to memory of 3136 1760 7c3b8fba9effae690dbef5d5e5fb56e0N.exe 84 PID 1760 wrote to memory of 3136 1760 7c3b8fba9effae690dbef5d5e5fb56e0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c3b8fba9effae690dbef5d5e5fb56e0N.exe"C:\Users\Admin\AppData\Local\Temp\7c3b8fba9effae690dbef5d5e5fb56e0N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:3136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5b7f49dbf4343fa723b9ba084c752c1f2
SHA1fcbec6ffd1dfaf767b73f4a98ddedfb6372a4307
SHA2561e1e8b995bbe264fcad91691c8fd847ebfca5aa2f540886a516c2f397710a48a
SHA512fbaebc4a4adfaa1db86b94734ef83635cac0a3e04c00d3ff68ae26d9a049424090807931aa9e946b79b200d475063ff0c7c0ca70f61239fe273a7a0ce2bc7b70