Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 02:35

General

  • Target

    9662c8a216f131e82991a690fd19094414be5e82741112d6be212c90d155e97bN.exe

  • Size

    63KB

  • MD5

    4010caffc7f3ca26f08a9e2895d22e40

  • SHA1

    69b29bed9f5cfbb6cd66ba99387caf0150e0b598

  • SHA256

    9662c8a216f131e82991a690fd19094414be5e82741112d6be212c90d155e97b

  • SHA512

    03f679a5f93eb25440c2c57b9a0019d6321809b640ee451478e44aefe396f9b80e5696f805cc60748de3fbfcb233718eef306203b2fe14fc664cb8aa26defad2

  • SSDEEP

    1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAjU+Eh6IbIKv8hIbHS:lAo1lOwvlKlXBP6vghzwYu7vih9GueIp

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9662c8a216f131e82991a690fd19094414be5e82741112d6be212c90d155e97bN.exe
    "C:\Users\Admin\AppData\Local\Temp\9662c8a216f131e82991a690fd19094414be5e82741112d6be212c90d155e97bN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:4612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    64KB

    MD5

    ce10af7deba125231511c2766e418642

    SHA1

    4798e649bbabb9599e29ae7158fbc1dc1bd9f9e0

    SHA256

    7de561d0c3cc2d5ec5356d4181314ebac0a5137b74dc38dd299b928bfa6e0c4a

    SHA512

    524159fa10821b494c0972b4976d73d0189b8e75b044915dcd1861cb4a132bdb79479b2db821dbe3555e1e68b24f29a1e9af3ad5fbfbaf732b82bd2fd8b8f155

  • memory/2216-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2216-4-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/4612-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB