Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:00

General

  • Target

    cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe

  • Size

    43KB

  • MD5

    0192727f5d8627a78ece8895a2e83d86

  • SHA1

    d896a9937f83cfd6d26027f7160af50bc34b2379

  • SHA256

    cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4

  • SHA512

    cdc1fa94ffde7efc51ed88b905794a6703699c0fdd6fe23a5a9a9685c418b59ea2ff64e4aae1b34e7ac08b1c6590d3fb6b8fbd2d55d1f75a52c4e7b72a4bd2fe

  • SSDEEP

    768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjUvJw3/R:e6q10k0EFjed6rqJ+6vghzwYu7vih9G0

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe
    "C:\Users\Admin\AppData\Local\Temp\cc3793402f6d430f390b63cf3e3c8c029b2bcfdabc45afc328588a1699e17af4.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    43KB

    MD5

    6e0f35a6fb5b4a8bea52e4a4b9e69c73

    SHA1

    d8df29ea7cb39ff3e6ea71efb71406b81ea18490

    SHA256

    cc2d51d3c2d65ed6f12b036eabfc9cb2a2fa5fe5cb23cc0052663a78c4b68593

    SHA512

    7f543fa22c7780656b84bf1a7197a30608690b71bdf7403cea9712b663b351d1f51efe44f7de4cceb3642f31a924c9dac29ac20c6fe4baa7f2b9f4c3961e3ec9

  • memory/2300-9-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2300-11-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2888-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2888-7-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB