Analysis

  • max time kernel
    119s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 06:14

General

  • Target

    2fd01e78f1d3f283a78af00dcecc5100N.exe

  • Size

    61KB

  • MD5

    2fd01e78f1d3f283a78af00dcecc5100

  • SHA1

    56a06c2c64bbcd8e53b4f2a84e0cf6e09386e296

  • SHA256

    2647a3dd2a400661c91a1a3204e72cd5ce83eb431ff60d85f2aa5535e51fdc12

  • SHA512

    9fd1c7be929e414edac6c1763e8b034e4a9df1682b18dda83ee1c55f99911c009469cf2316811caa5221faa1e185cb9ce04aa6ee741f59da254a3d24db170dee

  • SSDEEP

    1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAcBHUIFvSHbhqhJIFv:lAo1lOwvlKlXBP6vghzwYu7vih9GueI9

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fd01e78f1d3f283a78af00dcecc5100N.exe
    "C:\Users\Admin\AppData\Local\Temp\2fd01e78f1d3f283a78af00dcecc5100N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    62KB

    MD5

    d40c7f6d43c2c73b5ec63f99e56d75b5

    SHA1

    59c9dcf7288c15c9327ab00237c9110d8d406d83

    SHA256

    ebd2861bff0ed9c1dfeb7f61546bdf314002036a25ae351c4bcd372be89dc586

    SHA512

    b79a64dd7562d7be63b370b5f2ae7f8870b063972e526d46d29d422e3c0ed2c3f6e7ac4a6dd7beb0becb1f684300d6ef1d588e5510a42b620ce9ca243e1fcd40

  • memory/2652-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2652-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2844-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2844-10-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB