Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
26-06-2024 01:14
Behavioral task
behavioral1
Sample
645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe
Resource
win10v2004-20240508-en
General
-
Target
645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe
-
Size
5.0MB
-
MD5
e5799d0b023a0f40c8b74f2d9ca41007
-
SHA1
e4f60fe5a60fd1ac743be134513edb9eec6d9e45
-
SHA256
645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555
-
SHA512
d809067d864e8063e1639d6d0d182056ac81632c0507b1e586c7435afa5b3eda60acae41e043f310f8687a3816afb84585d2bd11572990f287c0d80cc37f7de9
-
SSDEEP
24576:c4V4MROxnFt5bHKTlQCrZlI0AilFEvxHiLx/q:c4CMi1CrZlI0AilFEvxHiL
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1380 wrote to memory of 2764 1380 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe 28 PID 1380 wrote to memory of 2764 1380 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe 28 PID 1380 wrote to memory of 2764 1380 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe 28 PID 2764 wrote to memory of 2148 2764 csc.exe 30 PID 2764 wrote to memory of 2148 2764 csc.exe 30 PID 2764 wrote to memory of 2148 2764 csc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe"C:\Users\Admin\AppData\Local\Temp\645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mjzznqfn.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1FC1.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1FC0.tmp"3⤵PID:2148
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ef5151ec8d8df1270ca1393da3f19b6b
SHA1502cb6bcc48e770da4f1e9f36a0ca0227a05ad34
SHA256ec43daa04cd8259e8c14bbcb00061956ae931d45bb8bb130f9633b0828027316
SHA5126c855ef98f724d699c816afea1742e608345905c50ca85841ab80885961d0fa15d377251e398ed3648398287453a12fac97916e779b6f261be21fd8b2fcba46b
-
Filesize
76KB
MD5096a92846acdb6787de554ca35c6c718
SHA17fdfabfc16a9db98dc6bf8266232f90a0671ed38
SHA25623f27dd69f2a577c899948f52a59fdaa4edf1cc515dcb474660af26aa67b8fac
SHA512a198f28e3cb28cb24ce92c8df9a9b631217c2e699cac51f943faa4a6f3ba6f0076933c6261dba87139d6a4ac6b5f82cdce60c367749c18e23a14e2feac68a9e4
-
Filesize
676B
MD56f73e7a459826ddfb61e5ad407fee945
SHA12615bef13de54e8393b9d0eb86d39b3b3716e871
SHA2566ffa25fa1e5f0bfc7166c85fcffeb58f6d00061dd1d8d04d31229890f44d3db5
SHA512ebe92f2b0397fa2bfd8427eaaf3c8f384655db7742dfa4e299af4300cd82d886a1c798681b32054c4583ee4b52c0e950cc42c9cc1a5a73463aee0ded02bec008
-
Filesize
208KB
MD5affb7fbb72cc447c1e169f4da2a6b4ec
SHA19243b01a1a1751955d9f22b180783fb8dbdf43fa
SHA256518b2c9ae85c53bf8337640bca5dada12e496d66e9327f6166cc3b9810486858
SHA512cb7a4b133262bc32f6a3c4144541150ce28f0a19caa97db57ebff0f4ab755951d2142a6942ae76858e2a9f23a69f53325710958c73318bb9c8a58763219454c8
-
Filesize
349B
MD5e79f7e8ce8bf962adb28b0c1b5089bd3
SHA15d4c2797a78bdc5ac1c88bffe75dca10da55fb3c
SHA256a5a5c992b9ba9857389a37624a6e591f1dd1884a0cbed8432234bbc8be4c4085
SHA5124be57d246e86981f12c7c407db1e95e2f2953a6e8d6fb73acd7f5c7594787ebca42e8ba943a25d59c6322f5b527ca86ea5ebb3114364a231d08f9d7670d4ef36