Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 22:43

General

  • Target

    9f39157d417202c31ddc372c1ba4a07347467a7b42ddf035a3efe72d42aec553N.exe

  • Size

    63KB

  • MD5

    c73f119eac2a334203c50ba7a4b93410

  • SHA1

    5cf4ba3e88ddf2e2dc82f00c9d144ba6094ed55e

  • SHA256

    9f39157d417202c31ddc372c1ba4a07347467a7b42ddf035a3efe72d42aec553

  • SHA512

    4ed0f1895afaf42033a284008dd2012cb61acaf515ee8b38ca28f31a5dc8d51f9662f9e7f05d780b368e20de9be4f14ccf8ad8cdd80bde97eee19dc5cc5c09b3

  • SSDEEP

    1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbIKv8hGIhyg:NAoglOwvl4ulkP6vghzwYu7vih9GueId

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f39157d417202c31ddc372c1ba4a07347467a7b42ddf035a3efe72d42aec553N.exe
    "C:\Users\Admin\AppData\Local\Temp\9f39157d417202c31ddc372c1ba4a07347467a7b42ddf035a3efe72d42aec553N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    63KB

    MD5

    50cfc7a6ca56b53365975bfa53085b56

    SHA1

    e9f67fcaa167d87c1b08668be6f651956bb65fea

    SHA256

    e6df9f80f57d2b3c2c63193c8c5fb7cc80a0ee73b6da99f61d11cb33546ac83c

    SHA512

    d52dad9fa78a078989a81037f4f7272851a278975ab7ac7448f17b5678f7f11af7f84d98203d199d196e505adfaad155205ec23db1ebe1134331bca6410ba1ae

  • memory/2788-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2788-7-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB

  • memory/2788-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2812-10-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB