Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 15:05

General

  • Target

    a4474784fd21127e30813f58d83aa790N.exe

  • Size

    54KB

  • MD5

    a4474784fd21127e30813f58d83aa790

  • SHA1

    ffdcc5c989a7c8dc1b508c148fd2c16e70ec9f92

  • SHA256

    387be0946ca10e99b9bb4582c1c2860579efcd4e404c47a74781d2cfee4c9176

  • SHA512

    ae44a324fc419bde622ed28926a65d3bf4f7a0da47b49dfdd117a63cbb74d8930194a2d8127383f133f11f2f83fb4d76ce899b5dd8d027e9bb18a26ab730e051

  • SSDEEP

    1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhII:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVy

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4474784fd21127e30813f58d83aa790N.exe
    "C:\Users\Admin\AppData\Local\Temp\a4474784fd21127e30813f58d83aa790N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:824

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          54KB

          MD5

          9250d0e73347d8c614282673ff558abc

          SHA1

          0f8768801f105093b56aeb010c12b0103ab939e7

          SHA256

          2190794bd88b2291e6819ec69402ff900e85202ae341df72a3774b79eda4f07a

          SHA512

          5ff8447fa8394d034d3d243fc269415ff22635310e024937b24d7c600ffd85258efc3fe9e3dcf097dd031ff81cf9bd6bf88e1e30ab048a9cd3e17dbfc7683571

        • memory/824-8-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/824-10-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/3040-0-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/3040-6-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB