Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 12:14

General

  • Target

    694aa65fab7fe79135322680c6b6c350N.exe

  • Size

    76KB

  • MD5

    694aa65fab7fe79135322680c6b6c350

  • SHA1

    1cc1704eb7af89a41a5f1135e0fa4c57d281ee97

  • SHA256

    a99a5cd6b702aa387242da8fd67140962927b5c04b30dba4c23fa6b7a2183c32

  • SHA512

    5039c4c457d0225d625b9f1aa842e057b07ab2ba7c5e86c8c6bc80f519c07900459ced755854e209fdb2f8e87dd7ec62ee9dd3c033dd09e824f924a23ba9ac31

  • SSDEEP

    1536:86RAo0ej2d6rnJwwvlNlIUBvsI7hrhEh9cpDN/qhAvPHG3GvUhCHi1X5GoOvmHOo:xAo1lOwvlNlXBvsI7hrhEh9cpDN/qhAS

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\694aa65fab7fe79135322680c6b6c350N.exe
    "C:\Users\Admin\AppData\Local\Temp\694aa65fab7fe79135322680c6b6c350N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:4572
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4128,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:8
    1⤵
      PID:2284

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\microsofthelp.exe

      Filesize

      76KB

      MD5

      c1a709370d56f75732b24a690a7405ed

      SHA1

      896a2782ea5c2cc5436116cc8a7d9158bc5d8f3f

      SHA256

      90bdd13a705c8d59b09066ca2a704fa32826e7b02d6934972a3c086e8bdf645c

      SHA512

      9a76848f85720a43dd9416539f8efcd9d35271c251b414aabb51f4250f9491307188ae62805d5d821dbf80c2ae6db2ae8eb99912cf6d0c8c0ae0190b75a090d2

    • memory/2328-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2328-4-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/4572-6-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB