Analysis

  • max time kernel
    119s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 03:29

General

  • Target

    9893e3921bfc51431440677ab805a5c8cb77d0e1e2185038ed555e3d6c260551.exe

  • Size

    71KB

  • MD5

    66333c05c512ad7549a1a7c3ea8e1539

  • SHA1

    91b2ad1c94c4f13969f1d1e4b440197b2b9ed4b2

  • SHA256

    9893e3921bfc51431440677ab805a5c8cb77d0e1e2185038ed555e3d6c260551

  • SHA512

    63ffa0aa394a4cad315603153cfe833d5f8f720cf3d5f3ab2b67770e292f9837685d7444a20943ce0eba91da110c64c2bc4048fc913371b4792b1eb86f7d0ae0

  • SSDEEP

    1536:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYVFl2g5u58dO0xXHQEyYfdhNhFO5h3xhIh:+MA6C1VqaqhtgVRNToV7TtRu8rM0wYVn

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9893e3921bfc51431440677ab805a5c8cb77d0e1e2185038ed555e3d6c260551.exe
    "C:\Users\Admin\AppData\Local\Temp\9893e3921bfc51431440677ab805a5c8cb77d0e1e2185038ed555e3d6c260551.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    71KB

    MD5

    d3714b9fd20a01697b2d08281c858f19

    SHA1

    eaedf673acc90af0e54603435a61d59d9ebc2d8e

    SHA256

    a1d4cc014a596a00830e01b6251687a08bffde115def2a5d3be42d02b5fff0e2

    SHA512

    1d1452effa3867069195916867866d31381b0f3df3896420c9b83227a2c160b01eba07a7b68654f0ba3c96969774b26489f409d92d8b9e1b517835879d407f13

  • memory/2584-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2584-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3996-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/3996-4-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB