Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:25

General

  • Target

    536a86c7e9ff24ee307ed8cd9a62e530N.exe

  • Size

    43KB

  • MD5

    536a86c7e9ff24ee307ed8cd9a62e530

  • SHA1

    7d460e6a6c69155fce4cfa99c92c83a00f51e1cb

  • SHA256

    86ac099cebeef63cff7f23e18244eaba61fdd7c8b871cc88dd723b1ede9bf034

  • SHA512

    75b656b3cf4f6b25f256f7fa52867e5b7efcb353b60f6d058a3632c2a5d2346872ee249c23b66c537979e53feca721599264c0601b015bb86760b15efc918f4c

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhq:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYK

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\536a86c7e9ff24ee307ed8cd9a62e530N.exe
    "C:\Users\Admin\AppData\Local\Temp\536a86c7e9ff24ee307ed8cd9a62e530N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    43KB

    MD5

    8242dbf32692e66bc36d79acb1f75807

    SHA1

    877605924c798e4fc2b176d0daa07d3f3acb6042

    SHA256

    c1adaea7917643ce51f501a81390c41eec1696e45d69bdcae2865d861530e5b9

    SHA512

    1ac9fa8b013ddb5f158ca81b0e5f1711b263deb475f2f6badfd66e21e23bd134b52e5d61cc719b72fa9b1770fa0403d5fad322f0c4b91b1dba087d98b66f7e97

  • memory/1620-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1620-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1784-8-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1784-10-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB