Analysis

  • max time kernel
    119s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 19:31

General

  • Target

    566e0cfb17926cc39997defbe39f65d9fb805c17ce3dc698f019f06c98e6d47cN.exe

  • Size

    50KB

  • MD5

    55265d45502dbca5cd698f50e70ad750

  • SHA1

    90aa5685bd325b2d7aa48a3050102e3516299d2a

  • SHA256

    566e0cfb17926cc39997defbe39f65d9fb805c17ce3dc698f019f06c98e6d47c

  • SHA512

    e0c14d59193fc848fe8f3c5c8bc98e7be7e45e3788e2888dd10c143f2273f3e420148da4289bffcff1b78b6ee4a402f4302c746bc7dd470a9d653a7adf6e1d29

  • SSDEEP

    1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIP:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVd

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\566e0cfb17926cc39997defbe39f65d9fb805c17ce3dc698f019f06c98e6d47cN.exe
    "C:\Users\Admin\AppData\Local\Temp\566e0cfb17926cc39997defbe39f65d9fb805c17ce3dc698f019f06c98e6d47cN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    50KB

    MD5

    43d15cf71487f7a227e37e2452edb2e8

    SHA1

    60adbf69ea0a9ab60f4e4eba27d8c1a62e5b515f

    SHA256

    6abb9841462b003db27e99f3f96e827ba08e5d8f6f67043eff749daf96bd27ac

    SHA512

    ae0e31fd4d532178a71fe3c355067e5fc3820977df6d97dc915a1e28601b89057e6c6617822bd39e65dae4a86071139f8d2f53e7b379faaf8c37fe37e0756b62

  • memory/2288-9-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2288-11-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2504-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2504-6-0x0000000000220000-0x0000000000223000-memory.dmp

    Filesize

    12KB

  • memory/2504-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB