Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 22:09

General

  • Target

    5e6277deb96576b7591550ec6932f14eecfcc096591450fc018ee877c23bd8b2.exe

  • Size

    77KB

  • MD5

    33561510184b34856db74d724dba1b98

  • SHA1

    145028670c37f58bcb8ba246b52cb2493a966d53

  • SHA256

    5e6277deb96576b7591550ec6932f14eecfcc096591450fc018ee877c23bd8b2

  • SHA512

    abf70a1f8b5ce6b3106f35904838f5d7ff61d214225fb6fa634878f41274adf93e9e5870c0e68698f1cb104dcfc582429b2258ea513b139ea14b352b5d745128

  • SSDEEP

    1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCIzhULoS:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhA/

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e6277deb96576b7591550ec6932f14eecfcc096591450fc018ee877c23bd8b2.exe
    "C:\Users\Admin\AppData\Local\Temp\5e6277deb96576b7591550ec6932f14eecfcc096591450fc018ee877c23bd8b2.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    77KB

    MD5

    18c267cae8f494230ed51dad3d3eba55

    SHA1

    4048394f50bd8e92c20351e327160b4d1792db6b

    SHA256

    d240395c4e6f83a01e92dbf3ca08301dfbbd8a460d1738fa1ef8e2e50f4888a1

    SHA512

    8f3413835df6b7b99f5b0f398d96c8356c00e95655f53992c63fd90014b6f2c9291d221a330405a8858e9c271b6d33aba9c3c334826462a29ca5daf1c675af89

  • memory/1288-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1288-3-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB

  • memory/1936-9-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB