Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-09-2024 14:10

General

  • Target

    ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe

  • Size

    43KB

  • MD5

    8eefb4a4134428b7e49310ef5ccaa500

  • SHA1

    8ce573b00d06c3fa1704738ca33c0687dbd8728e

  • SHA256

    ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466e

  • SHA512

    a12a7e13da907a3a95572fe9a580fe199c9bffa41084daa18543a3ce1adb798bc04a0d3d7f73bcefc817254cae2c1d9624e0d959aea976965a7d1b7111a88918

  • SSDEEP

    768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAcBHUIF2r:e6q10k0EFjed6rqJ+6vghzwYu7vih9GU

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe
    "C:\Users\Admin\AppData\Local\Temp\ea4dd65de5ad9eb5f54c384f0def46fff6c97153d9d195cc43f9adef74d6466eN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    44KB

    MD5

    18ff68eeeeb939a6c548a340bafb4faf

    SHA1

    48dafce47e0c65ec564f2730d0a9b2b9197a5127

    SHA256

    01385db8c04a8fb0ac12219e2c3fa6cc628b0f0f09d50bf2c8bdabe8b941603e

    SHA512

    e0b97dcbb423bd5602b3283077f0ad174a998c52584c897c671a86c4a2494b5cdcab7eecd89a18a1ecf144dc47efe90c29df62b8bad123e46592ca7635cf8dc1

  • memory/1876-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1876-9-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1876-6-0x0000000000220000-0x000000000022E000-memory.dmp

    Filesize

    56KB

  • memory/2416-10-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2416-12-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB