Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 03:28

General

  • Target

    18a25ed40c9771fc673a42fa4bb6b6f0N.exe

  • Size

    75KB

  • MD5

    18a25ed40c9771fc673a42fa4bb6b6f0

  • SHA1

    b332c616eed6c3a5d9a40ba11949d1c9107ea72a

  • SHA256

    3dd8aad57601faf68d9a3b2bdfc457a0a21eb12b074aec499e343c65022e1f85

  • SHA512

    de31ab23a37ab60c63a0dae5241b73aa17a357262b7cac5e5f2d4990bb6b3a1f09f2078f5fffdfb7a4f226c21ba5a22981046c39fa5ba60a942d30ebb854fe27

  • SSDEEP

    1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCIzhUvTm:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhA0

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18a25ed40c9771fc673a42fa4bb6b6f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\18a25ed40c9771fc673a42fa4bb6b6f0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    76KB

    MD5

    3959e65f1018e1b9223103b0c1bc0e12

    SHA1

    145992014f3d510a1df556ff75749dbe4a101738

    SHA256

    0148f8e95a8f1e88e38028918af7e5a02f04d8d4fc7d406427e74ab26dd57241

    SHA512

    b26f1dd3ae5066d05b1eed05012c263e9f4f37d43d6434733999d4285643841d79057a67e5fc2a0609f8d2e5ea893d91dfe665ba660bb5a9f99e26a51f85f716

  • memory/1688-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1688-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1688-10-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB

  • memory/2984-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2984-11-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB