Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 00:14

General

  • Target

    5a8d629a14a04e74e53c6c1312b019dec66a9bda0d9b81805520c7a9ddd574dcN.exe

  • Size

    44KB

  • MD5

    47cdc8127e3aba4e0748f7452ee27920

  • SHA1

    c127b21806257f32ed6239e6df6946a0e8010246

  • SHA256

    5a8d629a14a04e74e53c6c1312b019dec66a9bda0d9b81805520c7a9ddd574dc

  • SHA512

    a8ba44772e3ce860cd9cb5e21937cff30874fddafd1c9cd327f86e1f3bcbd62de08b8bd44f6cbf5d0a3a7256a92b769ecc8aafa51289d652e1bec7f4afb64632

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhT:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYz

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a8d629a14a04e74e53c6c1312b019dec66a9bda0d9b81805520c7a9ddd574dcN.exe
    "C:\Users\Admin\AppData\Local\Temp\5a8d629a14a04e74e53c6c1312b019dec66a9bda0d9b81805520c7a9ddd574dcN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    44KB

    MD5

    ed6ffcfb5f26d31cabb601f5af0d625d

    SHA1

    1af3109e659ff06db31b9333c62ce525f61f1bf5

    SHA256

    01448ed59bf21c9e03bca785babd8eb287bf2c89c157a724d44f82c12f3de07f

    SHA512

    84c46271e6221a0622423adaf4125bd3dec4ef7772e394fa380a01fad2106ea9b522cbd21ef54b2868d941704b46a0e480ad3702b0c79b22ea496fea8c384a1d

  • memory/2592-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2592-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3040-9-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB