Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 06:57

General

  • Target

    5b51d272a8242933339795d99ac3df60N.exe

  • Size

    77KB

  • MD5

    5b51d272a8242933339795d99ac3df60

  • SHA1

    79cf141515070d84e765a21e417e3ed573fbaf07

  • SHA256

    da395c3189f346b672bdad80001e24eca0077772ac9e5080d65fe6c38e90e21e

  • SHA512

    9a61ab09a28f6f843c88abfbf7baf339758cc17623cd25b470515961b08839ad3a6303b1b6ad7994ca990c4b87a4fba54808989d7bc9f0270242a66370f6804a

  • SSDEEP

    1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvPHG3GvUhCHi1X5GoOvmHO1:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAL

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b51d272a8242933339795d99ac3df60N.exe
    "C:\Users\Admin\AppData\Local\Temp\5b51d272a8242933339795d99ac3df60N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:720

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          77KB

          MD5

          6c04fc4cc5ef3c02fef0db90bf382c62

          SHA1

          c33b153576a8ea99308d68943e0e30baebf5a863

          SHA256

          2d26dc69ddd7d4c3ec97a36365ca0323c94cf642bddf756dca34a5cbe514c994

          SHA512

          f62d483e3ee13212551225bdf561b1b9f3febe0105ea8d2a11427a80d94df65b0886d7f0a019b71672cc44ab1dbbf033ecd6f1c5663f2b0f575bb43cbbc86d9c

        • memory/720-9-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/2000-0-0x0000000000400000-0x000000000040F000-memory.dmp

          Filesize

          60KB

        • memory/2000-3-0x00000000003A0000-0x00000000003AF000-memory.dmp

          Filesize

          60KB