Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:10

General

  • Target

    ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe

  • Size

    46KB

  • MD5

    a7c91b39fcec4a9d380c751a0e46051c

  • SHA1

    f8819996fe680c08ca95ce2fdac6c84f230750f6

  • SHA256

    ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462

  • SHA512

    bb403a7660eb18229c4dfb3ccc679314f638159c9c817ff76b5b9513b8ec1cef048342d7718ea0a411cb5f4288c366fb4c11b65086b2758d3892210f0f547f14

  • SSDEEP

    768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6ID:e6q10k0EFjed6rqJ+6vghzwYu7vih9Gf

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe
    "C:\Users\Admin\AppData\Local\Temp\ea5a5b0b654fcf43837740dc26d1f8643f97fbccd5e59909363edc611e0b5462.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    47KB

    MD5

    a40b2b0e8c69776ee36acd065f0bce77

    SHA1

    94e43abcb27efc5751d9105e85dc943f3b3f63f4

    SHA256

    849780536e64bc5dff1a3655b3cf8ced8093ba4466d8728c0d2392417ff7a49d

    SHA512

    67acebba8c0a05120c4607e84b33cc095f42bc70c3d7aff61e74e3ed556cf1ecb863f62ebd42d11b59ed118f660380c5dc6156716683869d337a74b84ff3ea7a

  • memory/2064-9-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2064-11-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3044-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3044-7-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB