Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 17:05

General

  • Target

    21bfb71331b476e357363a791c3c8450N.exe

  • Size

    47KB

  • MD5

    21bfb71331b476e357363a791c3c8450

  • SHA1

    fdb11bbefe70300b6f92477db331fd9a994ed0d4

  • SHA256

    9caa1cdcd41a24eeea2abd80e356a2f160ff8dd138df0c7494784a6a38fb0054

  • SHA512

    23ef4138656db6bfe34430a49b831ee4594b81a6772585d15bcd8b5a87c2749bdfba2137e7f08cbc5c03bfebfaf6bdf4797b5c21c1da4a110ac556af7885fffa

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh2:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYW

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21bfb71331b476e357363a791c3c8450N.exe
    "C:\Users\Admin\AppData\Local\Temp\21bfb71331b476e357363a791c3c8450N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3780
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          47KB

          MD5

          296d048ac8c7a219cb995293adead20c

          SHA1

          7a6b373e7e9e935448ec34dd419a07e911e228ad

          SHA256

          89489b616d76a8b3931078ef2830aafa4f810676718302f0a8df326cb00ae0a2

          SHA512

          9263dea8561c984cb5bbb3e1c7a146a6e9e151f5886466d5bce206ff287c7d4a963bfd935d2e9776a28bab8e87f455e46f8e165d9d3945b1d35cd0902eb49a0e

        • memory/3672-6-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/3780-0-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/3780-4-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB