Analysis
-
max time kernel
93s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 02:03
Behavioral task
behavioral1
Sample
f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe
Resource
win10v2004-20240426-en
General
-
Target
f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe
-
Size
5.0MB
-
MD5
a4c8388b79175063b36531780617feb2
-
SHA1
c2632a879a67fdbdc81e4f80b22e36147366102a
-
SHA256
f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13
-
SHA512
313ec442deefe8ff5c56543bad8a3088e984fad6d38f7740f068108e2278f1d1afa70a19c39a09f9fce3f57aa88e2aba2f840f66481f6fda1a966c17884d2428
-
SSDEEP
24576:zqI4MROxnFj3rxXFHXRrZlI0AilFEvxHiHlT:zqrMi1lRhrZlI0AilFEvxHi
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe File opened for modification C:\Windows\assembly\Desktop.ini f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe File opened for modification C:\Windows\assembly\Desktop.ini f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe File opened for modification C:\Windows\assembly f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1072 wrote to memory of 4528 1072 f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe 85 PID 1072 wrote to memory of 4528 1072 f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe 85 PID 4528 wrote to memory of 4852 4528 csc.exe 87 PID 4528 wrote to memory of 4852 4528 csc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe"C:\Users\Admin\AppData\Local\Temp\f43b05e365e1ec3ac9c7367077739e5dd0ab70e7a09d0734f5ae99644867af13.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xnpk--8f.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES4806.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC4805.tmp"3⤵PID:4852
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51bfacbc8629a9d2a878f7c503c9b846b
SHA1dd26642b21601c5e265d459d666023cc315432ad
SHA2569a1dac7a1faf2adb6dd869c4bc0545240d485515cf5a0c217ce30142ab9c9d1f
SHA51210de2a663627ae828dc886cc700e712ef3ac8d163f892e52922b868f8b8928c6835651ef404a189e346872a54f921cd67d3eda8c296a9a1fa0d0744dfaa5bfd6
-
Filesize
76KB
MD5b6435b27eb68059bf6d4fe87c86323f2
SHA14a5ffc5ae4924f38cb735ced6f7ee4b7e5ef56e6
SHA25694f57547e9e3f5c31c4ae46979b4d333516b397bbfa27b3cd2a13d35046f2b99
SHA5129bc3de9f56bef03596e5f16603adeee3b54ffb019dd00e76b33576c9299ef896dfbf937b58d6e3db97312f45acc04fef756613a0b562d2f53f66d00a2d897172
-
Filesize
676B
MD54a7afedc12eb0e6cea3d4cbf332e941c
SHA18aef238bcbe36fbe90dc28a11afce71406c76a0c
SHA256c7b9dd8ee40abc6e6e8b0f2e2436a0685c7935ab4f454b16e8cf2103e1216e7f
SHA512686c7fa98e751f212acc98789ea9be51bff4f7b9a455b663b755649b7826ed01b18b3bab2a1d8d1c239440a98dccb20c2a49df77d22215b145b192133a3c9f47
-
Filesize
208KB
MD5223a99945e23894153b42c767bec3821
SHA1f7737816dcfd5c63e320a86d3ce5c21eded105c8
SHA2566c4795a7206b7394cbe9404e15df9b11caba0da0c06e1a494af7902d26acad50
SHA51287cfff279961b471dc7acfcdae13cfc9c27f16f6483e9a64b207d099b3a33e71def73d4b658cc61fa69476cd4dd521deb00169d5d4b8bc1638ddfe92254881ce
-
Filesize
349B
MD52dbb4781ad7b4c91547fcd1f09fb5d5b
SHA1392461e2b530787203c3659ed2acdb998189d080
SHA25620f0cd0bbb7f8aa11d683c2d92c6fd6d6bd5457ba9af57a2a6763f5aec079205
SHA5125e91424202b0ab1ce2d887347c94095466f75f2d6e86b3a17b3e714ad04d11d003f58cffbf493187e6476af573423e0f6cd691990a1a18e379d1d2ed37f10cac