Analysis

  • max time kernel
    119s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2024 14:56

General

  • Target

    9b3514afa7c8c935e0a974a89c5b2595322fa75d7d27782cbcfe5e5c46b4928eN.exe

  • Size

    47KB

  • MD5

    8897d43871b7052fddce9c50cb1e6540

  • SHA1

    d41229554604cacfcfa35646298c5166939b94e4

  • SHA256

    9b3514afa7c8c935e0a974a89c5b2595322fa75d7d27782cbcfe5e5c46b4928e

  • SHA512

    67b696f6439d816b573b88475ad104d3ffbe7fbbf1c4d21dfba240d473f9b4d16732d13b4693b5060a5fedfffdbcbedbe53e08d731599e4f0eccd86649980209

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhf:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY/

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b3514afa7c8c935e0a974a89c5b2595322fa75d7d27782cbcfe5e5c46b4928eN.exe
    "C:\Users\Admin\AppData\Local\Temp\9b3514afa7c8c935e0a974a89c5b2595322fa75d7d27782cbcfe5e5c46b4928eN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    47KB

    MD5

    aebab1c0a3109933cb570ea46918292b

    SHA1

    710dce00f612cc38d27736cca65b05039ca1b8bc

    SHA256

    205eb2b634a847d07cc43f54bd75b24cf1e017badd6652bf8bea248fa410c70c

    SHA512

    6648b110f3f4f2a3da31a882d90f1b11cafab8ae53aa7175e9a745569f64c02bda1c8aca78ab034b23b5f1bbca49c1c940596a42757992b4f6fc8f1fbbabcbe3

  • memory/2572-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2572-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4792-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4792-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB