Analysis

  • max time kernel
    119s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 05:28

General

  • Target

    76de897250e677454741f230b10771f7d852f9b47a9a5d21a508ae07e55a9fb5N.exe

  • Size

    43KB

  • MD5

    cbddd62e75bb804f5e12b5f5ac7bb250

  • SHA1

    4fdab8182b063d2ede80c80262faf891174819ca

  • SHA256

    76de897250e677454741f230b10771f7d852f9b47a9a5d21a508ae07e55a9fb5

  • SHA512

    f0d8983f73ac499b8d334c21196a3c562095813bb72dba291abd9742c2902c548e3bc39b5142c30be6fd7357650f7a9cc0eea7d1ac7018bb82bacf122af9b2d7

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhY:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wY4

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76de897250e677454741f230b10771f7d852f9b47a9a5d21a508ae07e55a9fb5N.exe
    "C:\Users\Admin\AppData\Local\Temp\76de897250e677454741f230b10771f7d852f9b47a9a5d21a508ae07e55a9fb5N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4728
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    43KB

    MD5

    34e88be600f8ec8058d40c69b349cb87

    SHA1

    e7709f4b417c0c1c036fe69b6286ca460a4fbfc6

    SHA256

    a57d4d5ef3920002cef5985970c9830cf69b3c53c21c77db69d06968c1e02118

    SHA512

    048a6e9ff2ebb3aaaa90947c314d408eb5986c995a98f6ad8e1c957e2278f2de83de3ea6148cd9f394f2e36024db8f10e7af821497358e098067495f8e8833ef

  • memory/2588-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2588-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4728-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4728-5-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB