Analysis

  • max time kernel
    120s
  • max time network
    22s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 05:01

General

  • Target

    d7f7850478431212bf9fc6832dcfb3034d1119ed60f4bccc20ed7e8d4a606144N.exe

  • Size

    68KB

  • MD5

    b3451c4d3f74de5f1e21b859bb09fa10

  • SHA1

    045aeadacb1193a8a109c1b83cd21d6f06f24dfb

  • SHA256

    d7f7850478431212bf9fc6832dcfb3034d1119ed60f4bccc20ed7e8d4a606144

  • SHA512

    9302b91c171a4f885231b4e9dc66a68be80bbe25e811047534c416127faf6d022f3e3395035dbaceca6052dcb286d38cdab9b483528c004ebb6c929abeaf61a1

  • SSDEEP

    1536:NAo0Tj2d6rnJwwvl4ulkP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbIKv8hDhIhf:NAoglOwvl4ulkP6vghzwYu7vih9GueIc

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7f7850478431212bf9fc6832dcfb3034d1119ed60f4bccc20ed7e8d4a606144N.exe
    "C:\Users\Admin\AppData\Local\Temp\d7f7850478431212bf9fc6832dcfb3034d1119ed60f4bccc20ed7e8d4a606144N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    68KB

    MD5

    b165549658e1db905a3f6417fcbb9948

    SHA1

    09902c0ab03c84ad3b83dab4ec5383491b1f2268

    SHA256

    aa2ee7bb5595a5e28f79e49813173d2a17566474350763365b7e25e1cceafc76

    SHA512

    9391eb184d0d5b0f529782d9a3fde55cdcfb308d131eb1c421b16510e2b2f41de24e85b81c6044f7ce7e63494b1bfa052b7fd0b3579cd95e6380a59adab72526

  • memory/1724-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1724-11-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1908-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1908-9-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1908-7-0x0000000000220000-0x000000000022F000-memory.dmp

    Filesize

    60KB