Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
22-06-2024 01:11
Behavioral task
behavioral1
Sample
0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe
Resource
win10v2004-20240611-en
General
-
Target
0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe
-
Size
906KB
-
MD5
3f5aba024213bd15cb35f8e9bdce1916
-
SHA1
81d1a0fd4ca6c2eb146f7bb36024395018e59ad9
-
SHA256
0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829
-
SHA512
97e09c0ac0ea17641e745c41a3d2761f94218c3d8b2311b44179e50ff69c028d9fb08d91ac6e652aba3bee80af0a2a9ef2e52da154cb293f0eab50968ac0959d
-
SSDEEP
12288:xgfe07KFML7iLMucoUe7dG1lFlWcYT70pxnnaaoaw/7ueuRAHrZNrI0AilFEvxHG:WtY4MROxnFX9ErZlI0AilFEvxHijAc
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe File opened for modification C:\Windows\assembly\Desktop.ini 0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe File opened for modification C:\Windows\assembly\Desktop.ini 0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe File opened for modification C:\Windows\assembly 0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4808 4744 0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe 88 PID 4744 wrote to memory of 4808 4744 0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe 88 PID 4808 wrote to memory of 2052 4808 csc.exe 90 PID 4808 wrote to memory of 2052 4808 csc.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe"C:\Users\Admin\AppData\Local\Temp\0144a1460596b19ab4e667f76fdac6cacad536d11091d047d7f980ba90cf1829.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tkfchpj0.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES920F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC920E.tmp"3⤵PID:2052
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5bf81db399ac6a81173087d96ae2e58cb
SHA1010ab40b9ec28fb3b88bdfb6c15da42229ffeb0b
SHA2563693e55d5c6b84acac516a3b82504f8b6e8f66ce94eba55553629508f37cd86e
SHA512fee6f1ebb467eb53c88bba26102a2b29ac22fa9e149d076fa0f461de64e8e1f0dd9cacf7d69812a1194da85aa9b323b455080ef044d0b5f3409c956b27ade791
-
Filesize
76KB
MD5991255b91d43a8c0cb002a44ba6d21bc
SHA1a4fe946bbeb2949938534118f5fb312f03dc909c
SHA2563ef98a091e32c87e454c0c3f753b725fcf762d81684df79cc49c0c494b92d3a7
SHA512c4444e2ac2dcd20f29321a79feb9a46f591027f19eda1e9088fa53607390d28a1e26ef750137122783527318d711f3b67165d7eaa9031cca53de247b803628d4
-
Filesize
676B
MD515045dac2ef61ae38fdc9feccde905d3
SHA188ab5f7e69566bd0d0004a2554983773816fd9ee
SHA256a7114261878582d258787f1b2c53e3b80317540498f7a15fa6911c6018e224fe
SHA5121d83ecc5610ca496a1385e09eecc2a6a18a3cc2bc266a364a5c098710da0e98374f161f2499f219edec74fc5108ef77d01a75cc9212d96f366eab5c35c4afcef
-
Filesize
208KB
MD5f4347f0b02f29d8f1312d89b88cd031a
SHA12972b1b99fa84302ff33cdb00b8eaa4a0be11568
SHA256fe782de7024de452ad64dfda4d701a6b127cba9cccc6f3cbd41b7367787d67da
SHA5126cb92e29b8c0b89bff7c95dee1b0ad58711ca48b2ace7511533818b7f2aed587da7b2cf476763e38567df6e292e345f42b4a6469efc26d551a212a6d4d7a137d
-
Filesize
349B
MD5b0b2dce3e6fc3cfb5fedc90312a84cc3
SHA18504b46a3ae31377219427a2b079f2cb3f7dac0a
SHA25657bacc02472d5cc984ded622baea9837f90d42404aacda38bd6fd12544eb0be2
SHA512acbc6bd60ba9b81ab98f382505420f124c10986e8692d820ee20c1b361a324df50e68d8a57cba4ae428add212265ec70c2e0a7e2626dcd1215ac7d2ee319aaea