Analysis

  • max time kernel
    119s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 11:01

General

  • Target

    94de7114871276ae1b98db7ce0020600N.exe

  • Size

    42KB

  • MD5

    94de7114871276ae1b98db7ce0020600

  • SHA1

    4305bcf88c80b5eccaf12a6d28a6ff976d3324f2

  • SHA256

    650bc15bcc08827afe161408dfbd3d33f39bc1492e7cccebfb8fc908082f7725

  • SHA512

    d24c58dcc19fa5d3cdaea1fcb39bdfb10a60ce0990f2ac1647b4821e694f54c207ce885d39f5ebe278f6e90f0b4cf21d914e9e136209d04880c4ca2c5787310f

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhE:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYk

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94de7114871276ae1b98db7ce0020600N.exe
    "C:\Users\Admin\AppData\Local\Temp\94de7114871276ae1b98db7ce0020600N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    42KB

    MD5

    2c00cf978f7852cf35e302d4457dfcdb

    SHA1

    61f6f94abf938c88240bcc416a8f1f18da7d6004

    SHA256

    8936736542a508a227cb3674f3e7ed8349a021c250aff870791a77be6876fe41

    SHA512

    484df5770a6b415c77e7c9904374220599139b46a5300694293936c82c756b5e0c1400d160eddf34e3717145943812a1f459beb30e96b98ea03cced0ede46552

  • memory/2276-9-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2876-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2876-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB