Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-10-2024 11:06

General

  • Target

    a8bd58bd0175b94de3bcc95092e7a299f078633201a3f2520efda33d86249edcN.exe

  • Size

    48KB

  • MD5

    526040029d6e11d3c31d4355e37b4430

  • SHA1

    3f4da20641f75a018be3bb07759139781f8c11b0

  • SHA256

    a8bd58bd0175b94de3bcc95092e7a299f078633201a3f2520efda33d86249edc

  • SHA512

    aa6f6572b2a2136b5760f6f11cf532758fd1d4e3843bff0adfe3b24fffc603e67dddf64d7ec7d48eebcbd2d8578cfcc0bdf5168bee5955ce47a4c7054e7ea38d

  • SSDEEP

    1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIx:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVb

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8bd58bd0175b94de3bcc95092e7a299f078633201a3f2520efda33d86249edcN.exe
    "C:\Users\Admin\AppData\Local\Temp\a8bd58bd0175b94de3bcc95092e7a299f078633201a3f2520efda33d86249edcN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    49KB

    MD5

    ec2cc10763381434f82e1eb10bd56d63

    SHA1

    e5e5feb918befeb444270ceccf723a5b55bf7164

    SHA256

    0e09d55c62169897bcfa9257e76589534b074270aa7bb2624d9c8aee1185aa2b

    SHA512

    e22584d8f313538f7d428cf42fc86065408f12d2d71c487afe425c03099e72927a3f9f32ab09399d93dbd4129852d450730029a838e4fcb9eb4bf04bb1fbe3d5

  • memory/1364-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2272-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2272-9-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB