Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 20:38
Behavioral task
behavioral1
Sample
example.exe
Resource
win7-20240903-en
General
-
Target
example.exe
-
Size
903KB
-
MD5
de87df65430d0f19436429db542fe5b0
-
SHA1
bd4026365cbb6d4a7ea8b17a8fea83ab2e7a6037
-
SHA256
d55cb8d9ad30078be362414186e4e065394430c3c0b0fa83f06922f59d288a63
-
SHA512
325a50723fbcf82df0a22bc7c68177bd7f9df25a155f204439a27d9aafcd089a8963020b4f8800da8bd444ec7481b5976f717ef7630aa2588dc9cb95c6c46c02
-
SSDEEP
12288:sTUZ/Y95eo6L4ce7dG1lFlWcYT70pxnnaaoawZRVcTqSA+9rZNrI0AilFEvxHvBO:CqI4MROxnFMLqrZlI0AilFEvxHi5B
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
example.execsc.exedescription pid Process procid_target PID 2388 wrote to memory of 2552 2388 example.exe 30 PID 2388 wrote to memory of 2552 2388 example.exe 30 PID 2388 wrote to memory of 2552 2388 example.exe 30 PID 2552 wrote to memory of 1644 2552 csc.exe 32 PID 2552 wrote to memory of 1644 2552 csc.exe 32 PID 2552 wrote to memory of 1644 2552 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\example.exe"C:\Users\Admin\AppData\Local\Temp\example.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\u6oawt9w.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA352.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA351.tmp"3⤵PID:1644
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f33c7d134fcd5713a14b2db7efd2b202
SHA1f2243696ceb959c8b68364ad1050b79fe207f832
SHA256cc4a1263672bfa29f516b90649022644473b5d107bf351f61f3e5e9ac8dca44f
SHA512fbf94f3266aab3adf7f04165f27c28818cef5899b5abed1a776b60857e87c5776c0d97b04f0d4d4b6daee5e8798ec7a6e8c9f9e49ba42d5242ed28b2b48997f8
-
Filesize
76KB
MD58e432c4551d04f15c29ee2af3d1bcd98
SHA1b7232add3dad086fc974fe6540b5826623dbb040
SHA25686f40ddd17578c6f975e1507647a8fcbb13efdeb075453ae67322822fc1f3286
SHA5127e86f20ac2e60ec4b072fc54136b8b6f73871430e0bac0b391d30cce4de2a754be3557179a8bc0de57d7a851a35d01f870da5ffffadb570355325f28f60fde67
-
Filesize
676B
MD5fd588d5202adc7d99ec630001c480742
SHA1061aa7a9b401fdf8b5658b365386541467c9fe68
SHA25683ab1bdf4a1cbbf5babb6c6433f9480208ca92b3f3b115b72493ccf2824a1d32
SHA51267cae98aa03c3bcec56ee6aef06604e4276206f4a3e5b0dc3115a5855dac527d0d9a90a8d85456386da3af4f3ee4092f2608633837580027a7813b56a9129f86
-
Filesize
208KB
MD5250321226bbc2a616d91e1c82cb4ab2b
SHA17cffd0b2e9c842865d8961386ab8fcfac8d04173
SHA256ef2707f83a0c0927cfd46b115641b9cae52a41123e4826515b9eeb561785218d
SHA512bda59ca04cdf254f837f2cec6da55eff5c3d2af00da66537b9ebaa3601c502ae63772f082fd12663b63d537d2e03efe87a3b5746ef25e842aaf1c7d88245b4e1
-
Filesize
349B
MD51bec05b49e6c556f1693356a3abe2445
SHA1aed7a43673704797204f39a59705c8f62c517ebf
SHA25641764b70b7da021ed121acaee66c979747499e33b2f7b0822a3483bb3d7fc47f
SHA51295e04e55e570f767ae804ce71ac5ef003bacd71906cb65ab533912d446b7f5530a2ee8328ab4b38900a553739cbab209af6fae1193d3c9113fcdcc10313e81f0