Analysis

  • max time kernel
    119s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 12:33

General

  • Target

    32b58969347a3bf8eaa1d58edc4fce70N.exe

  • Size

    42KB

  • MD5

    32b58969347a3bf8eaa1d58edc4fce70

  • SHA1

    af78a1fe8aee117e599e42967e9ff69ae69867d6

  • SHA256

    0469bbc41e6a3a55e572fd6f5253d628d1b1ae194a08606b595936135dffc134

  • SHA512

    fdc172d21b096f47d7db1c7b26e8cef6fb7f89c1ccc1954facd19e0711c29cbc614b76d662cbc592465427290290ffa8f86f33d723c36995732e1a303e391f2e

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhH:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYn

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32b58969347a3bf8eaa1d58edc4fce70N.exe
    "C:\Users\Admin\AppData\Local\Temp\32b58969347a3bf8eaa1d58edc4fce70N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    42KB

    MD5

    b47659c14710dd306a740b7417f25020

    SHA1

    de7952ea57b95e6264c79c0f1d262e9c55508b86

    SHA256

    7427af920fddbf3ac474f169bc8e5e6b810013aa6a20167419e7bf96dc5f8d40

    SHA512

    b766cfd666be822173a7f7267b6f82390303f1cf27363d26eb8df5bfca97013d95e1e6d686794dacadc9f6f637cec9636c16c739e3e0aa593f2dc9c4f2229b09

  • memory/3328-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3328-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4596-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4596-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB