Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 11:05

General

  • Target

    eaa4ecd9411a09d873ddd65f9bc9af00N.exe

  • Size

    37KB

  • MD5

    eaa4ecd9411a09d873ddd65f9bc9af00

  • SHA1

    8963cadf29cbaa88d6e748cfe108f0832166cb56

  • SHA256

    b81b730a806fbf4f2a238c9893e6722ac037c16fb14dca9a54eb73180dfa1d28

  • SHA512

    1f5c5c9a3b455aa48b75d17c40771c08d4e8811e4289f220c17d9ecf7a77b7153440a4a1cf7109f0787318a3b3e289b291e534799fd75772506127a4673f33a0

  • SSDEEP

    768:ePyFZFASe0Ep0EpHZplRpqpd6rqxn4p6vghzwYu7vih9GueIh9j2IoHAjU+Eh6Ie:e6q10k0EFjed6rqJ+6vghzwYu7vih9GC

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaa4ecd9411a09d873ddd65f9bc9af00N.exe
    "C:\Users\Admin\AppData\Local\Temp\eaa4ecd9411a09d873ddd65f9bc9af00N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:1160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    38KB

    MD5

    0ec26ede6b3de6cf93afd970da4e27e0

    SHA1

    33e7b3b8b5432d65e9569387c0c23e530363f6af

    SHA256

    6edda5184f0a3bacf0be026b293872c8c7553627790a92d7bb22f16cbca50bcc

    SHA512

    6a745c67b28713c28f96165f43960e22b464836325f9622152b1f60a2d83fce2d8a7610c4e2c62bf6ba0437baa1b3e1ef9647b1fd7fcc1473589e08938a2a684

  • memory/1160-7-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2032-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2032-5-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB