Analysis

  • max time kernel
    120s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 08:07

General

  • Target

    c4e5bdb7263ffd9d6c2209c6a5609170N.exe

  • Size

    47KB

  • MD5

    c4e5bdb7263ffd9d6c2209c6a5609170

  • SHA1

    29f6fbed4126a63e8b75200882cdb6ceaba97707

  • SHA256

    b42f409312460e0e3105373826b5e2ca514fc11763de22a39f3a648c6a598958

  • SHA512

    79da97d14bf54151478eec370eb73d027c0e410c55a3bb6bc892f66be91f90eb847aaa3e5ee4745b2e28add5d6c204a264dfdab8b6927c31e1702fd79e6935f3

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhN:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYt

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4e5bdb7263ffd9d6c2209c6a5609170N.exe
    "C:\Users\Admin\AppData\Local\Temp\c4e5bdb7263ffd9d6c2209c6a5609170N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3760
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    47KB

    MD5

    8f1170eb7e595a03674205b672b352ce

    SHA1

    a037905fbf3a84f6f27304f6a7bf38bb408cb4d8

    SHA256

    e0e7a97dcf56d282b9ee1e818ab0f1fd7d165628ed338c14e2e5f68d322c6695

    SHA512

    d54e55509407a597c6a25ee00fed9610f3c9e9eaf67669481ea843c7762c3087912c2b76b72b6cb4f7d7ff5a72426a6926097734a469adfcafa3582606a2d18c

  • memory/2212-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2212-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3760-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3760-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB