Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 04:30

General

  • Target

    02343f7bb35a7f7df761557b83a7b450N.exe

  • Size

    63KB

  • MD5

    02343f7bb35a7f7df761557b83a7b450

  • SHA1

    e5105b031021a37bdf3a3a240982979aa7d4af69

  • SHA256

    2f3415f225ab6cbfc3b2588a5e57528c9fcd7bf16a3d43b090c88411c7b429f5

  • SHA512

    4ebfffcb111daafd0fd17967e85d818aa490fda9467148fced05cee8dd5076d49a80782b26d4374d6db6392ea2cace3f8cf1a562ee397b7c7488308238994481

  • SSDEEP

    1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+EmkcU+uhShrhOhr:NAoglOwvl4ulkP6vghzwYu7vih9GueIC

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02343f7bb35a7f7df761557b83a7b450N.exe
    "C:\Users\Admin\AppData\Local\Temp\02343f7bb35a7f7df761557b83a7b450N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    63KB

    MD5

    7fb5ddbefb789fe3a077da05a8a9e87a

    SHA1

    936cf7f3b04034b5511db8b2718d2b9d7296f53c

    SHA256

    c001aaaa16e7dc11ccf87e8ab7cb444340f287a2d7b97c14e2f8f597ffa8e9f9

    SHA512

    a9812c9a76a6d1e7c50bc3ca6dcaa6bd76f4325a3890895d709706356372bf0843dcd1a9d5106a8ce698581ec2c93fb628ea6cc94e2d6eb077bd7f68f428336f

  • memory/2084-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2084-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2856-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2856-10-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB