Analysis

  • max time kernel
    120s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 16:58

General

  • Target

    21f87b0119b20706c8fc3d108b65a561b40eaf7fb834f93297e04c048fe1a74fN.exe

  • Size

    47KB

  • MD5

    7a75c8c7e98ba871b43e2e1e69d395d0

  • SHA1

    448e883d60518194e8f5c0ed7a7026d9a20a066a

  • SHA256

    21f87b0119b20706c8fc3d108b65a561b40eaf7fb834f93297e04c048fe1a74f

  • SHA512

    2784eaa6a0c4ce4e79be9a914be0364730329d23a65fcacc08f49c58d747e110d3f2e61f92bea1420b95a7c7bb5bcd9c1ef403b600be5a826b7553791628bbc1

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhr:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYL

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21f87b0119b20706c8fc3d108b65a561b40eaf7fb834f93297e04c048fe1a74fN.exe
    "C:\Users\Admin\AppData\Local\Temp\21f87b0119b20706c8fc3d108b65a561b40eaf7fb834f93297e04c048fe1a74fN.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3168
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    48KB

    MD5

    841358c2bcdfaec56a163ee25ca267a8

    SHA1

    b22921ffa4c32448a1cf6ab002da6d6acf3409da

    SHA256

    a0d675153b1f989fe848f05552204ccdaf17b4a04cdab3347735ed0fb6330ae7

    SHA512

    bc9758c0d181f78a4e24ed31ca1555972aba2d66cf70c3e2a2f83e6581b79bd89d9f45f049baec6840eca23af79330ad82f2de0f11f8305339c2c255ef9955a2

  • memory/1100-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1100-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3168-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3168-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB