Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2024 02:50

General

  • Target

    edb531272693594f26e8a90739d70d0ef923a4d55166618d82d2f01ce99ad170N.exe

  • Size

    64KB

  • MD5

    254dc6011526114e90fdbd5fe5b06070

  • SHA1

    7b2030b842566625284f6b74b17ff8907bd36220

  • SHA256

    edb531272693594f26e8a90739d70d0ef923a4d55166618d82d2f01ce99ad170

  • SHA512

    3f6d5272b427b98039364703a31b138133d0ee96e99601ad940f72c426dbd9884b09f09ba9fec64ee2060a8ad8c3b11c47668b40e2ab084917a061cb1cb9e73c

  • SSDEEP

    1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAcBHUIFvSHbhqhJgv/:lAo1lOwvlKlXBP6vghzwYu7vih9GueI/

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edb531272693594f26e8a90739d70d0ef923a4d55166618d82d2f01ce99ad170N.exe
    "C:\Users\Admin\AppData\Local\Temp\edb531272693594f26e8a90739d70d0ef923a4d55166618d82d2f01ce99ad170N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    65KB

    MD5

    f916bdd439741aae18903d11f26285c7

    SHA1

    9dccf195ffaa1981c1ea9e615987f02329d8995e

    SHA256

    6366655ee870464bc8fb9e47ef957a3c570fcd5c06cd60ecaaa345e128fc684f

    SHA512

    cb386db14924f059037429ba75d7caa55946af1511c680dc16fc29cced7adcc8a0ea5e4b0e952e20dcbffed5d8b378482692a6ad364c62c7440538439b469372

  • memory/2280-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2280-3-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB

  • memory/2300-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2300-10-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB