Analysis

  • max time kernel
    119s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 10:07

General

  • Target

    a5ce1ce1ce116e8f302ed0ef8c92a170N.exe

  • Size

    40KB

  • MD5

    a5ce1ce1ce116e8f302ed0ef8c92a170

  • SHA1

    ed1a9b08d2d36b883bb1b8400ef99043d3409ac4

  • SHA256

    da048c0654f37a02f3c8432e6ddb4d1e3f88f736fba8413ed39435334313e660

  • SHA512

    978c0b301d08368f7d599594fac04f3dd6a9e724d3df2621cdbf767553828da57e8289d782072ed9f617b014e63ef59874610d80597a7f3ec2bd5e72fd8b4330

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhw:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYQ

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5ce1ce1ce116e8f302ed0ef8c92a170N.exe
    "C:\Users\Admin\AppData\Local\Temp\a5ce1ce1ce116e8f302ed0ef8c92a170N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    40KB

    MD5

    2ee7b7555f4a616c37924845249898e2

    SHA1

    93765d8b994510ffe21421ed832f5e7136ffc7bf

    SHA256

    e8b5ef67c1e8d45973e20c3d76697e5bfbc26e2870d85a9d2fd30f73aa7bbe5c

    SHA512

    b8e410c76942296a27b4464a0272734ba3e322ed7e7f203516910fc22e8a0198b62233f6136a4eab3146135f98698c857f626ec63d51679dcd8e1fac3c13db21

  • memory/972-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/972-4-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB