Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 14:13

General

  • Target

    19b23a45c94e919648b8a24d9b05a590N.exe

  • Size

    38KB

  • MD5

    19b23a45c94e919648b8a24d9b05a590

  • SHA1

    251254472e806576e4d3a8735d3e9fada88aba09

  • SHA256

    2f1c170805f4cff1e17c6df366ecb73897f3064733d72dde24e688935c0d6313

  • SHA512

    4fa81fa28576a544811925cf474dc17a95b3d4491bba6674b84fa383dacefab32feece39aca3b0db135de691fe16b1af19ea926bf4830f577a9faf3f5f870d95

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhR:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19b23a45c94e919648b8a24d9b05a590N.exe
    "C:\Users\Admin\AppData\Local\Temp\19b23a45c94e919648b8a24d9b05a590N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    39KB

    MD5

    bc030b1ce722acb83ccf8b4b71961fb4

    SHA1

    8afc56d9f4eca35d39a6a91e892c3cf84109c7c1

    SHA256

    6bcd4e3e708d3483524f121f02d2bc6ce0546176850362cce1a5dd4cab74ce1a

    SHA512

    d87b85fd9c8ba18b2ec4402167d1550fbd3bbba26b95cd0a598d61a9ef3ec79d562f34317b48b3bb5303e92844722764b99e41296118a89f9d1f69ca5de2b493

  • memory/828-8-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1656-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1656-3-0x00000000001B0000-0x00000000001B3000-memory.dmp

    Filesize

    12KB