Analysis

  • max time kernel
    119s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 11:44

General

  • Target

    b2c14ed5e2d7197fa12e275e5d7a56690a636bb9a91327d71f794ec4be373b35N.exe

  • Size

    62KB

  • MD5

    e18ea2d36fe5e80942acb0eb7565f580

  • SHA1

    190316655169ec1aa52be244b33ede849db691ae

  • SHA256

    b2c14ed5e2d7197fa12e275e5d7a56690a636bb9a91327d71f794ec4be373b35

  • SHA512

    c483bd1c0291ad0794c99ec544dc4b3409ac6fbc87f6aeeb99bcfeab83e9e37ca02cf9c61df1ecdc584d93ae39a0cc748e667f023d62aa0125eaec8faae3123f

  • SSDEEP

    1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIF:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYV/

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2c14ed5e2d7197fa12e275e5d7a56690a636bb9a91327d71f794ec4be373b35N.exe
    "C:\Users\Admin\AppData\Local\Temp\b2c14ed5e2d7197fa12e275e5d7a56690a636bb9a91327d71f794ec4be373b35N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3308
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    62KB

    MD5

    7e95e145c3c0e4ee6a389948dee4322f

    SHA1

    148c9d5fd2085bb2197f807c00158069c92b13ad

    SHA256

    7253a3811bf25fbaf592c1f096ce56b6274c2c1084aa0fec8b7b392dd7f85143

    SHA512

    a7d7f33946b7b5a6e3684eddfdec97e9430d0d6c4da4b7bfaa3d0ceb61cdf896bf2c5c6654ec33c868b30ca3ea3390a393a73b077f97b996011e122c449300d2

  • memory/1532-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3308-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3308-4-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB