Analysis

  • max time kernel
    119s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 00:47

General

  • Target

    896b0a4020d7e080436ae73188ebd580N.exe

  • Size

    43KB

  • MD5

    896b0a4020d7e080436ae73188ebd580

  • SHA1

    9e870620f44ca5e7b9cdd609a32dbdb372ad806e

  • SHA256

    a913f398e533b60c87bb3cfc90609a9efef6727e092da78564744eb5542fa85a

  • SHA512

    5dc9c22326cdb0cbde467954e6694c886f598ef989a113e2c66825e1c8aa2c7785e05dee39c355cd7f39ed0a441fd091a4682b3ef8b260ff992180e5ee12d71b

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh7:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYb

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\896b0a4020d7e080436ae73188ebd580N.exe
    "C:\Users\Admin\AppData\Local\Temp\896b0a4020d7e080436ae73188ebd580N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    43KB

    MD5

    ce9f7a428486ed2091ebb6ecbde534f6

    SHA1

    108d0b7feea6c862ee1ea87b2b949cace6e7106d

    SHA256

    c175785965f7065d8941e7c51c75f9383f1caaf3e4ac3a1aca2e6a7e059500f1

    SHA512

    478d156467f77a4e664167f04c41a0e91741fbaf0a1128f2494f918ec1d0a11358d88bd404430cf08c7253ba67f0f5bcea944a7cabd26b30a51951da540735ed

  • memory/3292-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3292-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4724-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4724-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB