Analysis

  • max time kernel
    119s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 13:54

General

  • Target

    122c6829aa35ec94ef53b8d67d16d5d0N.exe

  • Size

    58KB

  • MD5

    122c6829aa35ec94ef53b8d67d16d5d0

  • SHA1

    5d9f833b8d973b396bb46932f3c2f0a3ca4b6032

  • SHA256

    f1d7ac7f65086e21379d897e637ba047ab45046787102fb1c7769714a7bc1494

  • SHA512

    be335189d82798fefb09d74bcf6dd6bbbe5960fb110401626d91c799effc49d5e0f13b85499d4c8a49c5e5f4861cf8ad67680329cbcfeef131866bbd19472fcf

  • SSDEEP

    1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIO:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVQ

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\122c6829aa35ec94ef53b8d67d16d5d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\122c6829aa35ec94ef53b8d67d16d5d0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:5136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    58KB

    MD5

    8321c14f4dd41a7334167bee7f355865

    SHA1

    d2c96dd39ecea97723c019ccab5c39328f8a3270

    SHA256

    c12843fdd405d0a4b9567716e3c76828ba13e470231bae7a82d723c059fc0dc4

    SHA512

    cd9c064972afab8280442d46dc37c5576cc331c01583b3740123bace0034cb71b55c97c23b7127627673610c22bfd804b0492893d5ce73707ed34cbab8aa1753

  • memory/2340-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2340-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/5136-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/5136-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB