Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 00:16

General

  • Target

    4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe

  • Size

    63KB

  • MD5

    dc2682f7f727b35932ab58fdd2569ab0

  • SHA1

    03cfd02dcc1031e089da56cb6e4ea6395dc0d357

  • SHA256

    4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435

  • SHA512

    2c3d2ca72312d26439dddf3184ddd24333e9be6883d50d3bc689685000d69f243af900aae50237e5cc9cffd825b42306fafb7a3d8304377927fa198c109609f4

  • SSDEEP

    1536:lAo0ej2d6rnJwwvlKlIUBP6vghzwYu7vih9GueIh9j2IoHAjU+EmkcU+uZd7ZYhH:lAo1lOwvlKlXBP6vghzwYu7vih9GueIV

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe
    "C:\Users\Admin\AppData\Local\Temp\4c113b6371675940791470769767540c5fdec562651020ea39569b0e19a5d435N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      PID:556
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1040,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=4608 /prefetch:8
    1⤵
      PID:912

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\microsofthelp.exe

            Filesize

            64KB

            MD5

            2a6b06160341b683d1fa51c74a41ba9b

            SHA1

            ee85e38b632e7da657419e9a862bc89d81a787cb

            SHA256

            6dbd3c2d0ccfcec321d4d58927896d0ee2eb9627781bf65093b54b14edf5ba07

            SHA512

            2a8f9286113daf0dbbd1eaf34d3b23e833ee1a26e8557ffd4c5f8ce0f31e0a6e6bcfe72c4ca2bfc38f089d3edb7795522c1f1bd47a404a15a67350f4aa0799c3

          • memory/556-6-0x0000000000400000-0x000000000040F000-memory.dmp

            Filesize

            60KB

          • memory/1880-0-0x0000000000400000-0x000000000040F000-memory.dmp

            Filesize

            60KB

          • memory/1880-5-0x0000000000400000-0x000000000040F000-memory.dmp

            Filesize

            60KB