Analysis

  • max time kernel
    119s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 08:07

General

  • Target

    357b3abb7e9dcad0aa35793b9576e210N.exe

  • Size

    51KB

  • MD5

    357b3abb7e9dcad0aa35793b9576e210

  • SHA1

    83b6b8268b10f264846dac656ab90659dbda01fe

  • SHA256

    91609856f53d49204e1584bc842266a10ed60d18c5c41f55c817df94662db75d

  • SHA512

    7b88f1fc064be9de0f997e950970d7c58256c65ee07572318827fe097c443358a3fa1ba32b67e4b5143a55a253bbfe16ad11fe51c114b78c4f434f93a3c2edc0

  • SSDEEP

    1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIw:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVu

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\357b3abb7e9dcad0aa35793b9576e210N.exe
    "C:\Users\Admin\AppData\Local\Temp\357b3abb7e9dcad0aa35793b9576e210N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    52KB

    MD5

    52f9826237308a6b13b8c858fd6bb669

    SHA1

    7e86384daf2c1ce7a5134155525ddf633c16a55a

    SHA256

    b9554be02c1dbfe39d714ac60e5ea8ddbed0a874211843740ff965b63b691192

    SHA512

    052ceb210c5cc291308a7ab8f7c4866f02d7bf94c468bf0e335649eca9e34876ae6ed3fe6d55ce390cb7c506928044b890d1a2477a5dec5ef536f1b8261de015

  • memory/2100-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2100-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4688-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4688-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB