Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 01:14
Behavioral task
behavioral1
Sample
645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe
Resource
win10v2004-20240508-en
General
-
Target
645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe
-
Size
5.0MB
-
MD5
e5799d0b023a0f40c8b74f2d9ca41007
-
SHA1
e4f60fe5a60fd1ac743be134513edb9eec6d9e45
-
SHA256
645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555
-
SHA512
d809067d864e8063e1639d6d0d182056ac81632c0507b1e586c7435afa5b3eda60acae41e043f310f8687a3816afb84585d2bd11572990f287c0d80cc37f7de9
-
SSDEEP
24576:c4V4MROxnFt5bHKTlQCrZlI0AilFEvxHiLx/q:c4CMi1CrZlI0AilFEvxHiL
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe File opened for modification C:\Windows\assembly\Desktop.ini 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe File created C:\Windows\assembly\Desktop.ini 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe File opened for modification C:\Windows\assembly\Desktop.ini 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3560 2788 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe 81 PID 2788 wrote to memory of 3560 2788 645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe 81 PID 3560 wrote to memory of 2452 3560 csc.exe 83 PID 3560 wrote to memory of 2452 3560 csc.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe"C:\Users\Admin\AppData\Local\Temp\645597465ea4675277057c7ddaf0cd975cdf91fa5a76ccf94ecdc8574f8fa555.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\y1vu7n2x.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES563F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC563E.tmp"3⤵PID:2452
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD538e2c0a2c8122a8eddebca4291c2619c
SHA1b46613aecdd6fdaf00150951551dc77dda5d6b3f
SHA2569aca1a841937220f1b2f1847ba848de1ab8fad04d154fc739a52b58945a221cf
SHA512388d4c2a61aacb36cb6dc4317684932a5e483d09a51ef6364523dbf94e4057e8883c9e167d2328cdfd121495fe89078d41fc9d81e79e23622c251f423d2a4273
-
Filesize
76KB
MD51d529408347184bb5a4108d27fa5e09c
SHA1b6e0f5c4610ae6d1f5b10b5b4479011c710752c6
SHA256b8cfccde6d8ec8bd5a097d25d106c971909db76f31ffcfa28d44f01e5cb9b893
SHA51293e3204798bed543ea41070dd9771ff62e25291ca8341bc51421906b7a15e0ad4f2104fe4729e50d20058d9739159e7063100e2f603e09fafcd07d0ab6fc0fea
-
Filesize
676B
MD543e6dfdad837e9502dc431fc0ea53335
SHA12c7a26b03047a8266d5721da383af5f5acd05a94
SHA25659150a594b9cd3321d58dbf055315ce9ae6026c2111cdef5569566bb690437c0
SHA512bbbead1dd7e65280f0c1b879da1183c52da4711c6c2491dff323e32d169edbd0686b049045e8fff4b05ba0de7a0e1c57c58a1862add879a972d6c0e4d85fedb6
-
Filesize
208KB
MD5334ba29759bfc9c7054d9c3814bad6bd
SHA1361d5e5df659d08cf239bc8dc53992ba6075c333
SHA256c1e1e72df2c54c211efe802293302d79f7cca42ee740ce0c23d298c681da6b06
SHA5123de07f28f9ec5a0ceef34b48a2da55088637e3e33a5ab59e00137dc97c65731c5e22c2b3c4b175e2467717fcc4a6bd3f822671b1ac03f860ae9f4acc85b14926
-
Filesize
349B
MD5e4667c2b1555c32603f01a47c9e0cd28
SHA1fb774bf2377d0603cef5bf8d4e8089a3dee91317
SHA2565f0a324e15f051792962df9931a02724fc75b2ad86ce957e286a272d4fcbae3c
SHA51201ca1cff845324f765e580d7c200eec57b744ebb14a2572e7151e2c336d8cd1edd195f0f0d8638dd2fe18f028575f0047a7ee9abc8f40c4bf41438404d45b4fd