Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
31-07-2024 01:07
Behavioral task
behavioral1
Sample
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe
Resource
win10v2004-20240730-en
General
-
Target
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe
-
Size
3.0MB
-
MD5
25f00bde128e2a9c2e2a902642f66b19
-
SHA1
2b325bdac1745903d19d66ce3073f2314bb5c37c
-
SHA256
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d
-
SHA512
877d03687d167534a9f054258743c82ce97fe13672e94dc69e3dad6db50516ca97dfe5d5e9250e822df5de1ace79cc8b51dcbc2e680f74baa8f66dcc24c31f98
-
SSDEEP
49152:O4m0ie4mZKMTEuSyRfz9W7GvbwkHKMAypQxbTjo9JnCmF6drxwI0AilFCvxHT:O4Die49KzW79EKjypSbPo9JCm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.execsc.exedescription pid Process procid_target PID 2368 wrote to memory of 2588 2368 a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe 30 PID 2368 wrote to memory of 2588 2368 a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe 30 PID 2368 wrote to memory of 2588 2368 a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe 30 PID 2588 wrote to memory of 2600 2588 csc.exe 32 PID 2588 wrote to memory of 2600 2588 csc.exe 32 PID 2588 wrote to memory of 2600 2588 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe"C:\Users\Admin\AppData\Local\Temp\a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ze9v-68k.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC562.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC561.tmp"3⤵PID:2600
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5381e1f09883960709d1008de60bc63ba
SHA1e5cc0056490b8bc73858f7d00c5943a501ec0431
SHA256062e4dbd41c4bb8489b302c1c8eda4154fc7e54e34110e60889cc1d0f2482ba1
SHA512b23c2e6c1904974bbf8c5dcbc8ffa319a59cffba3b3986e94ae4a2f6a36964ac12e0e576872bce222f4acf5a0162af03714bf12704303ec7cf08d40dbccf8728
-
Filesize
76KB
MD5c14aa328b846bf8e61cf58ce54215038
SHA1c220036d6368ca51f3337858c1c25851be896ecd
SHA25684444ebd1851ed158a5be5671c40afdeccf87b5c38fc43d0ec7e8909e6d4488b
SHA512ed866f3998b0fc0cfcd5a8f93a1db388ed8404d9eb72e672918c1c269a4ffa1a0708b055a2ceb1e6500464c0948b349e5430f1ce2cb016ff85e4fcb903766245
-
Filesize
676B
MD518cfba0752c1088f2c07414fc077cbfc
SHA1a68b8fb0d971e3db619bd0a2c2c50506386f946c
SHA25694c6efee69a44877409a2707899cbcdd8b4a0fe1f8cfbdf48a9f372e3036dfcf
SHA512211ff68cbbf6bdcce66c8c4f0365e9fb96cdf945f05ac57047bd2b88f04968a70b3ebcedcb17e0e0e3c168c3612cc722a2975adbc81ec46d2e4dd91c54acb0ba
-
Filesize
208KB
MD5e6b593f9de407978c2d6cff6206f2ddc
SHA1dbe980cc4e8d9acc60b48d55d92387c1266399f7
SHA25658019b32f285239256d295e7eccb22c6c84894f788931b06ce21663de4ef63ad
SHA512b7c91f95da8224c7cae008701c8686f6731337ffb0e572e69a8929d9769be047eccc0b5c31fcc29f6f4fa9780884d7aa8e80ac2838926575bbcaf6cd61d2dec2
-
Filesize
349B
MD576d1467c042d2e11840d97390d5a7660
SHA17c81130a2717654c5584d528a8a0a2d49eaf9815
SHA2569485e65fb0292889d0b28274c8edfa774d71da95ebd4793c5bae801b89b505ef
SHA512c92a228056cfe2dc2ddb344a427540c5a109869be11278d66f67efd02dec2b9cb968fefe31ac1fe1f7670d73b4acf37434c319080e536195508a5d761fc38ce4