Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2024 01:07
Behavioral task
behavioral1
Sample
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe
Resource
win10v2004-20240730-en
General
-
Target
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe
-
Size
3.0MB
-
MD5
25f00bde128e2a9c2e2a902642f66b19
-
SHA1
2b325bdac1745903d19d66ce3073f2314bb5c37c
-
SHA256
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d
-
SHA512
877d03687d167534a9f054258743c82ce97fe13672e94dc69e3dad6db50516ca97dfe5d5e9250e822df5de1ace79cc8b51dcbc2e680f74baa8f66dcc24c31f98
-
SSDEEP
49152:O4m0ie4mZKMTEuSyRfz9W7GvbwkHKMAypQxbTjo9JnCmF6drxwI0AilFCvxHT:O4Die49KzW79EKjypSbPo9JCm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.execsc.exedescription pid Process procid_target PID 3996 wrote to memory of 1532 3996 a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe 84 PID 3996 wrote to memory of 1532 3996 a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe 84 PID 1532 wrote to memory of 2476 1532 csc.exe 86 PID 1532 wrote to memory of 2476 1532 csc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe"C:\Users\Admin\AppData\Local\Temp\a95130d9516704e9f80a00dfd4fba85144c79297823db15186d26c031ce3ec5d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\twmhhazo.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCCA7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCCA6.tmp"3⤵PID:2476
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD548e819bf1e758870689eef03193b34e7
SHA104ea33d69fb1958c2b25e20df08256b452ac8696
SHA25656e7a1cfbf3a5f4bb01ba11ca254b5c56bc7480792236306ab101d5ecbf16988
SHA5129f8fa4c4a08b458a94326f8587a03550fe2ad0cd202a08442ad0d4fe0d10472d21a0db28aadb0e135b89c7cc0039a7c4829b60b329f67be0acd3bfe9cbcefc5b
-
Filesize
76KB
MD5feaefb496a4d72d302be83f702932d29
SHA17a6cfe5829493b7d55822b232db98507475cbf00
SHA2568969f37e9d8f196153542550cb54f134327fe7a257b170d4d3b7219666620912
SHA51248fe9586de3013a527933bd3af8b729f8186e9ce796a69a57fce64dd9fe73885661c194494b014a48631f74bd434919d3a22436ce368c34d31c7b9540e322470
-
Filesize
676B
MD5b7ceb76a8599f41e15f96a78fe781f41
SHA1d54342727e934629dd43d2be4cb4f7a4da8aa92f
SHA25620e36f8d545089bb92df2092a7aeffe385cba73ef4c26a0f7788c0d51040999c
SHA51216aecae855dbd849f6caa18b6cfe6c8bcd9d0ab8809f2c3b5ad156c5b432e0b5ca1c4c18a45363efc801156734d2c37fe2421099903eff0563684e0358b63d29
-
Filesize
208KB
MD5aabfb4c9a6ded2189d452da3f653a10d
SHA1972a2d2f82851b13f3dbdbce30a3418d81e7e750
SHA2565bebe0c5bd82d2a5aaee901a91af4c130ccd4feb7509a60464adce42019fc160
SHA5127c72dd94e419cb88959b8b78137dbcf7b1651c6908eae1682172d8b7debd6242b220c7a67a35fc5880050bbf4985e9590929d0c955d14d5783f2e317e70f0927
-
Filesize
349B
MD58b6b95b86691512d98ba6d3cd1293f1b
SHA1b6365ea59e99399d0785c73f33372fde39bb64ab
SHA256c37103a21afa8da3eba0b1a61f62854aaab78ae9841932ca0d870831de8bda37
SHA512ad081fe7805afeee3246a2a5dd3e002d629e33954efa62ab723571fd88f1dc3a6d8c2486892176525c28d15aca95c38857f1165383031f630f65e8f20956aab7