Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:08

General

  • Target

    67ffe8b56395531d46aee2010278c7904a2d285a4d6469995fa4556ce458d9d9N.exe

  • Size

    39KB

  • MD5

    b627276f3d0b3c256b9a5c3bed3f3280

  • SHA1

    31ec5b2263ed92f54bbe5240321db3c3cc6a8fe8

  • SHA256

    67ffe8b56395531d46aee2010278c7904a2d285a4d6469995fa4556ce458d9d9

  • SHA512

    61188031dd4668073596295fdbcd18295a53a627ae6520d56bb7c0ffc7b79eaec6e3203ab9469d9a8de7a6955ef851f530be8c734f603760d38dac469e7b21bb

  • SSDEEP

    768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/2:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gp

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67ffe8b56395531d46aee2010278c7904a2d285a4d6469995fa4556ce458d9d9N.exe
    "C:\Users\Admin\AppData\Local\Temp\67ffe8b56395531d46aee2010278c7904a2d285a4d6469995fa4556ce458d9d9N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    39KB

    MD5

    23c45a315170cdb31c421794f2362687

    SHA1

    66597011475037c6ab12ee275e23665a3d8d5a00

    SHA256

    306d926520cd0aa8f14561a5f8a86cf9302805b4e78990167d5c484ae0e93036

    SHA512

    2825a4b1fed7e2129e6d33140f7b43ce37bbd30504766e116d181b9cae1e9e4d969ae603e88b48ed16f9be0d149b26eae0381dc0310d22fdc475868a3273094d

  • memory/1860-9-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1860-11-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2420-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2420-7-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB