Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 01:00

General

  • Target

    6087db6188b59a9ec280370d8401fe6eb90318ef8e0a5fa34ab0fbc8dd027686N.exe

  • Size

    41KB

  • MD5

    95b13e45924d13e87f9d27911797ca40

  • SHA1

    dfa17b60fb72689ffd3d1591d6eb32f4803c0baa

  • SHA256

    6087db6188b59a9ec280370d8401fe6eb90318ef8e0a5fa34ab0fbc8dd027686

  • SHA512

    129523bb066e86b50582ff4f32fa7260811166ecab19fcb57ccdd8152a9018d13ea6bd026f1354950cd6d6de72f8128b923490dddab1b79579b0d3ab34b4e455

  • SSDEEP

    768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/u:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6087db6188b59a9ec280370d8401fe6eb90318ef8e0a5fa34ab0fbc8dd027686N.exe
    "C:\Users\Admin\AppData\Local\Temp\6087db6188b59a9ec280370d8401fe6eb90318ef8e0a5fa34ab0fbc8dd027686N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    42KB

    MD5

    ea3c8bb6256b4ce1362f3430f76c3767

    SHA1

    1d6f714c07f668ec20b811aa3f8056105dbe0bb1

    SHA256

    8a8f7368970f83be06f58121daf1ac58d9f42931ad675b78692cc818a36aa186

    SHA512

    c91a2ce70082d0326fc9571f7b3c20d5e3141c88e45294e6b0360480e1bb79b84d80c8418951227d8c3cd0e16c6ab4202535d5fd847802790cddbb8633de01e3

  • memory/1628-10-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2600-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2600-7-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB