Analysis

  • max time kernel
    119s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 12:56

General

  • Target

    e98ad85c6bfd5ae0d312131852f08fa0N.exe

  • Size

    62KB

  • MD5

    e98ad85c6bfd5ae0d312131852f08fa0

  • SHA1

    d4b90f4d2728bede21d39bcb75a6f3dc77b2097d

  • SHA256

    e520d0c425665f956cb80c6274266710933273ca9db7b9c61e2b09c2dac204c6

  • SHA512

    fe785c641a5773b2e7648cbe6abd7ec8658236d19eda8ba1bc3bcaaa03802067bfed1d8b27f4fcfb8c0859b8a5b30f9b50e6417bcd23a856d7530c8db4902f6b

  • SSDEEP

    1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbRJhHhLhIn:lAo1lOwvlKlXBP6vghzwYu7vih9GueIJ

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e98ad85c6bfd5ae0d312131852f08fa0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e98ad85c6bfd5ae0d312131852f08fa0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:936
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:3824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    62KB

    MD5

    2360ae7d5f405422c8e387970e9da09b

    SHA1

    fcfefa71ddd099dfe53d24e65314094c7e7945aa

    SHA256

    60ed6f074fb83e0242f39d6dc476c8ab38d11b095ed7930dc83c69eae2cd776f

    SHA512

    e7f5ec3ecf80af9e9b462e21e3cbb465a9e454f31c1d21cbe973abac004e651ebc17a8d928e5a7b4ee20958482c01c542f7055852c4d410d3764caaccf653897

  • memory/936-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/936-4-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3824-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB