Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 01:16

General

  • Target

    6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe

  • Size

    77KB

  • MD5

    30d29de69675882ff769949d9a7364f0

  • SHA1

    cb4524e33c12403ff01d113762fa24f52cc4e9e3

  • SHA256

    6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8

  • SHA512

    fed931b3c4cf5361ff444a707d00c17f3892b12f47585d09f5f46f2ad4d401d51f41af207fa933c55ec1a9a938d4a562e423a2bad7599b992a484a124a6b6079

  • SSDEEP

    1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OChhW4dI0h4HCISGGHMi:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAX

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe
    "C:\Users\Admin\AppData\Local\Temp\6f0842a107a140d7e77aa12ee2e41049764c485c614f1612bbe6f991c5cc45d8N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    77KB

    MD5

    ccf19238a956b4c8d319bbd3f7730148

    SHA1

    f03e0b278d0b1a449bfe29a491575e5032c92f3f

    SHA256

    27f5e2285f1e08392f8f6f5353c67ff2d5fa66e93a3f8f54bb157e57b9bed650

    SHA512

    8b710cb5373c7004f2300f1bb039aa0e4e91fcf5f991f15075972cb4cba254533229e61367542d906776e82f7d5bb2347795a53331081e416f2e5dc306414f0e

  • memory/2068-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2068-7-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB

  • memory/2068-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2996-10-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB