Analysis

  • max time kernel
    149s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 23:02

General

  • Target

    77bac67cec4efacf467528c033f0136aed9439906a95c7978b8af0d874709ea6.exe

  • Size

    56KB

  • MD5

    9375ba378f59e1d2c5e797ba66542603

  • SHA1

    ef097436aac92e71bcdbcf3ffb51b08c5d2b876d

  • SHA256

    77bac67cec4efacf467528c033f0136aed9439906a95c7978b8af0d874709ea6

  • SHA512

    5c8b01169a12bb16e3e1109b4a0c0a747ee9ec344322b1372156b0427e908434f29d795659ac1e72403b5402d819946dc14c5b2b1e8010187161a4eb812b6aa1

  • SSDEEP

    1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIl:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVr

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77bac67cec4efacf467528c033f0136aed9439906a95c7978b8af0d874709ea6.exe
    "C:\Users\Admin\AppData\Local\Temp\77bac67cec4efacf467528c033f0136aed9439906a95c7978b8af0d874709ea6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3768
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    56KB

    MD5

    e76787ac195fb6a78a578c4bf6b6275c

    SHA1

    481d27a1f999c2122d43e8d0dcc5e93851a41ec3

    SHA256

    afdbdfd69c49c9c4eb4b72947e6349e280ec88006d8ec3f60e85781b006c21d1

    SHA512

    66b711d9d23be1c2caa803ac0662e7178ece9c31b4415849c6341dcafc88de1a2fbf84e8907c6b02951ca841a828058f3f55aa97073118727b2233ad28d6cca3

  • memory/3768-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3768-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3864-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3864-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB