Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:32

General

  • Target

    795489639cbc4dd219b46f2a4c815f4ef619a7903aeb958218edd15e6e32887eN.exe

  • Size

    43KB

  • MD5

    ff65c6005e48d197639747435a7323c0

  • SHA1

    49e99beb7dc2b6dd8146b44b9db6dbe7b3dadef8

  • SHA256

    795489639cbc4dd219b46f2a4c815f4ef619a7903aeb958218edd15e6e32887e

  • SHA512

    8159364f8ca8d80b29f3c42ec5f72a487a542dd7e1c06904a41b84135dcf7118b0ef76b1262945484d30bb88a2dbb1b04329d9b1360be1aaa1832abcb097324b

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh/:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYf

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\795489639cbc4dd219b46f2a4c815f4ef619a7903aeb958218edd15e6e32887eN.exe
    "C:\Users\Admin\AppData\Local\Temp\795489639cbc4dd219b46f2a4c815f4ef619a7903aeb958218edd15e6e32887eN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4676
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    43KB

    MD5

    b8baf8c8969e2e79a8a82f5bff9a3fb8

    SHA1

    74cb8b2ad245fc520e5eba3133b87b9975c3fee9

    SHA256

    4c295ae5a60666b54a388439f68ed31c995b79e79145c9d56cbb606a791de615

    SHA512

    3865c94431adadd132c5cfce4979c3a06370274d72d37e2f25ff7b18ff549eef43530dde49911191d5ac51a24cf16523dd789722bbe8ba706ec46111921e0b9a

  • memory/2860-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2860-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4676-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4676-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB