Analysis

  • max time kernel
    119s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 00:26

General

  • Target

    146f03f476ed3f44718342af50166be0N.exe

  • Size

    47KB

  • MD5

    146f03f476ed3f44718342af50166be0

  • SHA1

    a1a833f89a4cc7176b32a95f250ab2dbf73c734e

  • SHA256

    65a3681a419499ebd675b6d7230a4b305cdf0f7a4e24dfc0c9728d7938e76815

  • SHA512

    34a6fb45c250804c47fb5300725a4c85feee3ca94261069da262c9474849562a1084994d86fae0f3a0b3e19842ed9fe4f735017d4cfe12d32c928e942235fd36

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh+:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYe

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\146f03f476ed3f44718342af50166be0N.exe
    "C:\Users\Admin\AppData\Local\Temp\146f03f476ed3f44718342af50166be0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2372

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          48KB

          MD5

          665c6a1e70aa29b70daeda3baa7187ca

          SHA1

          f29561741ae7c4a3f2e1faf096375412de5bc476

          SHA256

          09cdd87ad6bc456412eedf8693b8d5780b94b8fc6e4ece71b88588b13e0aad9d

          SHA512

          440595e0838107dbb2beb934426414adaf54f913512eb62a01e14d6317c2a5f430f43f06ccc62d8aadd4a9632aba194dd028a62ecef3d2f4d956b0ee423cea5c

        • memory/2232-0-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/2232-4-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/2372-6-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB