Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 08:08

General

  • Target

    6e2e75e96abfd674378081a07161f4f857cca50be57fbd9b5fb8bdbe05463b90N.exe

  • Size

    42KB

  • MD5

    18bb171bfcd9baab3e84f6143f8cf780

  • SHA1

    d793dc41199cebe44962326f21d8192bb9ec13a6

  • SHA256

    6e2e75e96abfd674378081a07161f4f857cca50be57fbd9b5fb8bdbe05463b90

  • SHA512

    0a871d6c4af961cffea08a7fa180fdca671090733ed1f10ffc24737052728557ba5d7ec62e44b7680a7654baa6b9610141e97f7ec661fa9fee641f5f408b5a7a

  • SSDEEP

    768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/w:e6q10k0EFjed6rqJ+6vghzwYu7vih9GL

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e2e75e96abfd674378081a07161f4f857cca50be57fbd9b5fb8bdbe05463b90N.exe
    "C:\Users\Admin\AppData\Local\Temp\6e2e75e96abfd674378081a07161f4f857cca50be57fbd9b5fb8bdbe05463b90N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    42KB

    MD5

    ac33361935aa7bbd9208d1ac9261081b

    SHA1

    e8b3bf30aa8f2e22b62d004391fcf86ff7db1ab5

    SHA256

    6e0e63ba480a90dbfaa5d36b0745a91ce20fd33faa20e0821ed2fe48592c0f81

    SHA512

    4d4ba3a5b1b09e884a140665b258c231e03ad5b8b59d41a845c44117410a0accad7cae28b9a7319563affb658fa1dc41e137f5d13c77307bd0afa51e5343932c

  • memory/2724-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2724-7-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2760-10-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB