Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 13:48

General

  • Target

    b88a636499bb76e69635555eac4f96f197e92ba262ac27f85ed1b7b73eb6f4b1N.exe

  • Size

    83KB

  • MD5

    1b5c985624f6565d2f83de50ec7b9a90

  • SHA1

    5659a920bb3846154970bddd7b62b7d7a40b9315

  • SHA256

    b88a636499bb76e69635555eac4f96f197e92ba262ac27f85ed1b7b73eb6f4b1

  • SHA512

    03cd8969a106bd96c28504112edc3fa2690d2f415e41e2e692393152b344d9590e43228fef5fedb9979b10b0ff9e2f0a638be903d017dd7714085d73a3d6ebd1

  • SSDEEP

    1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvP3OInvnHvvxIfhqhcGoI/b:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAb

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b88a636499bb76e69635555eac4f96f197e92ba262ac27f85ed1b7b73eb6f4b1N.exe
    "C:\Users\Admin\AppData\Local\Temp\b88a636499bb76e69635555eac4f96f197e92ba262ac27f85ed1b7b73eb6f4b1N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    83KB

    MD5

    0e5167fd17b104caad4c9872fba39ec3

    SHA1

    7777ac707610dadd6c896a25816792aaf0c3b32e

    SHA256

    86976712b8f255dfde4d52d077a09f5701b05d7efb14c6f25a9c853173feee2d

    SHA512

    e5711e8fb2c5db3a6707fe2ec2bf24498e213e6ec6dc8000aa2b5799c00948c0f0a211ba81f6c55bf1baaeafe843d5d740cfcc4e1a8ddc85719ce9150cf8fb51

  • memory/2064-9-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2064-11-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2384-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2384-3-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB

  • memory/2384-7-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB