Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 06:52

General

  • Target

    35a2c5330de423d57e937d62f91fcf9bdafa6c4c8b336920543073acb1b41e47N.exe

  • Size

    80KB

  • MD5

    ff031dccc9627da1e43a714fc7d86cb0

  • SHA1

    d41673a5aa35dbb1e7d9cb7a7912bae930644473

  • SHA256

    35a2c5330de423d57e937d62f91fcf9bdafa6c4c8b336920543073acb1b41e47

  • SHA512

    a10f91efa25cac0de4bff908fff13b5af09dfe75d839b00c4683483559dca158d38bbf2cf0eda38e744a5e1faddf79d08036c64c0ed671fbdd19555a39536627

  • SSDEEP

    1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OInvnHvvxIfhqhcGoI/s:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAs

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35a2c5330de423d57e937d62f91fcf9bdafa6c4c8b336920543073acb1b41e47N.exe
    "C:\Users\Admin\AppData\Local\Temp\35a2c5330de423d57e937d62f91fcf9bdafa6c4c8b336920543073acb1b41e47N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    80KB

    MD5

    e66bdff7a6ecb29e6007ba22b780aca7

    SHA1

    4d3db713f7bdbead96f3f2722a4856d65638fd81

    SHA256

    46d5cff0ebfa0598bc71366f7946f2e709b84aa881cb941bd208f2803ba58303

    SHA512

    2286aaf99f4371c9cbfe54471db5f70b85a881e65c9b8fc695e489652036d197ab26b81b9e87a9170c88d9f10cc628c40fe2db713510c9912bb4e32247e2f9c1

  • memory/1392-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1392-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1780-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1780-10-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB