Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 09:18
Behavioral task
behavioral1
Sample
nursultan crack.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
nursultan crack.exe
Resource
win10v2004-20240611-en
General
-
Target
nursultan crack.exe
-
Size
917KB
-
MD5
120802a68926043553500b2521832a7c
-
SHA1
18b9d5a66d650c6fc5bcf8f4401f0912d209f354
-
SHA256
490e237dd1557759ef2f1f7ea188ffec35d01199483ba77d027b2b5d654d634d
-
SHA512
b226c83e8d72292d56cd63f2b2192b80acbc7ba19c9c418f5d168e61886ab971b42abc9f0b9c85611af42ea6601a9d08b2066ca0a8b07a99ed1d1df54a052a85
-
SSDEEP
24576:aVl64MROxnFi3erxrZlI0AilFEvxHi1kp:aVDMioe1rZlI0AilFEvxHi
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini nursultan crack.exe File opened for modification C:\Windows\assembly\Desktop.ini nursultan crack.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly nursultan crack.exe File created C:\Windows\assembly\Desktop.ini nursultan crack.exe File opened for modification C:\Windows\assembly\Desktop.ini nursultan crack.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 216 1032 nursultan crack.exe 85 PID 1032 wrote to memory of 216 1032 nursultan crack.exe 85 PID 216 wrote to memory of 4876 216 csc.exe 87 PID 216 wrote to memory of 4876 216 csc.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\nursultan crack.exe"C:\Users\Admin\AppData\Local\Temp\nursultan crack.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1nd0bqua.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3EFE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3EFD.tmp"3⤵PID:4876
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5cd6cfc3b4e00f9a575fe8384f30512c0
SHA13fce37f96ba498745355f46864436e060b72b80b
SHA2560d5c658d31450e6422ccf6aa238dbd0f61758cca8589bd926c1973c59ce8e176
SHA5121dc5cb5da575890d2d1b94675ce5d26f7392f5c6443858baea98704cbe54e268ebd0489baf5730dad94bb1fb1d9aadbab48946abda77317a2417500fbe715526
-
Filesize
1KB
MD5afaa6f63dcf3ba68746ea0fbcde46a13
SHA15f0c6449889a3f3f132ca8e4698b9838d3a5b004
SHA256249cfe7be8193f22d15dc71b7e42c5f68edc9af11246c7ea58fa954929700cd4
SHA5125bf482be663a748622ac32f221e429cfce2e173b2064acf7f3ea1797fa0d80d6c3a8b07e98b2fdc6e9c1960f5349d48d15e88ba5d02459ed339cd41f4358d361
-
Filesize
208KB
MD5aae69fe3d279c58d3c4d7286f795a3ba
SHA1226c8c511a75e0f7ead63c4c40d26a535154ac48
SHA2560540037b5124581e6ea08e5c41899002ad0250aee1eee304e31fcae0a4013061
SHA512e0cd9f0646a9d3fd1a2ed1aeb6fed6af79fa59b44b88be8d36f5734b79d0fa77de2fb11901ef07d91a994f2325b9d8603fb8d2a55766ee3aa40f4a58b1b603be
-
Filesize
349B
MD5dcd1cec5055c0f72902e3fe9d79a65a9
SHA1c17a1d984e5c57fc8ad480b67c7fc71ceff45055
SHA256a1acbebfe737c1221c585082c9b9664d1a3ee5bd3b289d8edc8d36b42b5dda7a
SHA512884415ffa2f56e33c32473226541426707b4266bb0731a2f48c1f0864b90f3a0ed6feff1b1ae8f2900d7568eb5f2827d59ee6199a5b40d76baa07bcc487b8d40
-
Filesize
676B
MD55d0195fc6101f1acba6443be6df28b58
SHA196b07af3a48c8d1bff128a897b0559c34c4c4234
SHA25684bd199100404837b0c7f8445641df8e2dc4b9b7b05db382b6af4733e4e8b90c
SHA5125fa24267309df21f740875efd49521a2fe842d03e70b99cfc2241014839b90c6cce0c15433e6e043f7ff3c82d729691aaa64f3f21387d96271558347b74aaa8c