Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2024 12:45

General

  • Target

    6abdb4d1fc6cd24676e1a342bb05eed786d6c0d49d2332b3e77246dc48295293N.exe

  • Size

    66KB

  • MD5

    d94961906d52dd20127d11cd2482e280

  • SHA1

    86f55587a704052e903c8f2c545ee82ef12665ba

  • SHA256

    6abdb4d1fc6cd24676e1a342bb05eed786d6c0d49d2332b3e77246dc48295293

  • SHA512

    78061034b93b3a2cc987dca932123ec32b7a76c6bb7442e5a0c873c5c893828b7a1c067344ea330fa134ef79ed349dfdf19e6f774829a8ad48a0218e47cf277b

  • SSDEEP

    1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAjU+EmkcU+uZd7ZYhc:lAo1lOwvlKlXBP6vghzwYu7vih9GueI6

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6abdb4d1fc6cd24676e1a342bb05eed786d6c0d49d2332b3e77246dc48295293N.exe
    "C:\Users\Admin\AppData\Local\Temp\6abdb4d1fc6cd24676e1a342bb05eed786d6c0d49d2332b3e77246dc48295293N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    66KB

    MD5

    504740909ad4fb952757fc86ceb08295

    SHA1

    1222bc6fc70c22d4311b68e86ed45c59e32b87f6

    SHA256

    f506362bf281cb8f6ec90c074e55dc3e020e2b26a15cde242f9c6cddb1f88bc5

    SHA512

    7250eada69d99852b958ab2787f5cefd241e2eebf01dc70fe99fc80d2a8b5fd9336b7fe05903544a1c34b1f431e109f7c93003c96ae5ec3d09715a86258fa4dc

  • memory/2504-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2504-10-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2568-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2568-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB