Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 02:26

General

  • Target

    e3707d61f0be3e235c9c057b492f1a8936ae06d05b549eecd9685e8614afb3bcN.exe

  • Size

    78KB

  • MD5

    cb2939c7826367e0ca3d8f2aeed2af70

  • SHA1

    3d94b0818e2b9b308fe8da88cfdf864c0abf4e13

  • SHA256

    e3707d61f0be3e235c9c057b492f1a8936ae06d05b549eecd9685e8614afb3bc

  • SHA512

    47835ec598d172a6ccf186b18f87fe27531c7465b3ff2d756eb98dd12a1ace32e710b2f22cd0a5fa4dea8e4ffca136714eec82ecc4680a439e42c34b28379663

  • SSDEEP

    1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+EmkcU+uhIehXehh:NAoglOwvl4ulkP6vghzwYu7vih9GueI9

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3707d61f0be3e235c9c057b492f1a8936ae06d05b549eecd9685e8614afb3bcN.exe
    "C:\Users\Admin\AppData\Local\Temp\e3707d61f0be3e235c9c057b492f1a8936ae06d05b549eecd9685e8614afb3bcN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    79KB

    MD5

    3fe759b6f0893397498481fdb0d83b94

    SHA1

    c42b56d5aad48a8e67a55920ec832950f7d9c6f0

    SHA256

    821c79e8d176fbdfd3db7fda0a78066148997ea4b12a1dcf6023d3a4f25e005b

    SHA512

    8762be0d870a7ee09134fabc52b4aac8f95fb2009d246e25492c2ba88026c01d081fdbe64228dc5b4b8c237572cbf3466f54f25969f4eef14ad51505fd131b45

  • memory/2164-12-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2348-2-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB

  • memory/2348-8-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB

  • memory/2348-7-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2348-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2348-11-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB