Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2024 23:54

General

  • Target

    23540de42aa9d6868870e5d14224ee30N.exe

  • Size

    42KB

  • MD5

    23540de42aa9d6868870e5d14224ee30

  • SHA1

    bf991756426e0499eadd3ef0696f197c3245980d

  • SHA256

    668e01fa511937fc22481882669ac05d2e0e912e03449c0a9f1efdf7f87c9fb5

  • SHA512

    5177df02878722428c835bb503bd269855da395daa3c484dd00d9d380335437432d2d29928a1e3f9223f61beaa835e8a5c994d563d8c1c9e1b42265f1054b4aa

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhh:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYB

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23540de42aa9d6868870e5d14224ee30N.exe
    "C:\Users\Admin\AppData\Local\Temp\23540de42aa9d6868870e5d14224ee30N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3104
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    42KB

    MD5

    28954f739a5bf934a9e2d5020c7e16dc

    SHA1

    3ea8f76cd9b47f7d50a32de4bfc8ba915f891634

    SHA256

    ac421e8734c97d7a0bf1215c875e6702c640f97883955927f2fc2e45b289349f

    SHA512

    edaab1943dd01e2ea68b5468c9e6d4f2b6f6d94c6e2204559569ebf2040db65d5eb9267c07484efb668fb758f6b42d71e3b8d383b465a9e86e55d17d8e807e64

  • memory/3104-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3104-4-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB