Analysis

  • max time kernel
    143s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2024 01:08

General

  • Target

    25a3041691d6dd619674793fbc18b0d4a1ed4ccda48c69c2bf5fcfb853e54e00.exe

  • Size

    903KB

  • MD5

    2ec00be64e179c3de3a63ed4d19d2b02

  • SHA1

    563db59de0196434cea3ad0b9fa6c63c471bc5f3

  • SHA256

    25a3041691d6dd619674793fbc18b0d4a1ed4ccda48c69c2bf5fcfb853e54e00

  • SHA512

    17f5672b53b21bb7946772999be18f4c16ac84762e061a5f495de8383b67aeb61f114b17033db5da18c59759189eaf968b7a58805f79165fdcc45486a7f39825

  • SSDEEP

    12288:1TUZ/Y95eo6L4ce7dG1lFlWcYT70pxnnaaoawZRVcTqSA+9rZNrI0AilFEvxHvBh:dqI4MROxnFMLqrZlI0AilFEvxHiOB

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25a3041691d6dd619674793fbc18b0d4a1ed4ccda48c69c2bf5fcfb853e54e00.exe
    "C:\Users\Admin\AppData\Local\Temp\25a3041691d6dd619674793fbc18b0d4a1ed4ccda48c69c2bf5fcfb853e54e00.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0d1yvqv5.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES12A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC129.tmp"
        3⤵
          PID:2672

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\0d1yvqv5.dll

      Filesize

      76KB

      MD5

      d7efdf4e95afe05cf9a5677fc4489bac

      SHA1

      68c54fb4d21a8ffd2c86b0cffccc573ba40eb81e

      SHA256

      30d6317afce6baae627d407385c2e0243345a0aae30d98b76ab4152c0e11394d

      SHA512

      66ced1fb782e4c8d878313f074efad390e463a175f3762153d1dff24292ac52424a84f16f9eaac66a9b88f10bb3500c3db07b1feea9736613857ccbfb208a99c

    • C:\Users\Admin\AppData\Local\Temp\RES12A.tmp

      Filesize

      1KB

      MD5

      56517c18120f6de7a231efd33713a359

      SHA1

      2c283ff2d70f6a1dddb2c848e77993a7650e15f1

      SHA256

      b4278dd83872a7ccd4133b3d8ff66deed8effd045602f337a5288c7b60cbe033

      SHA512

      4009c10071b1dc44086e35a5d758738fabdd3aa4fdb94dcd293722b40b755002c26c87ca77d4c2d72938de5df70c54256b18f48d6322f03daff53913edfb23a9

    • \??\c:\Users\Admin\AppData\Local\Temp\0d1yvqv5.0.cs

      Filesize

      208KB

      MD5

      c555d9796194c1d9a1310a05a2264e08

      SHA1

      82641fc4938680519c3b2e925e05e1001cbd71d7

      SHA256

      ccbb8fd27ab2f27fbbd871793886ff52ff1fbd9117c98b8d190c1a96b67e498a

      SHA512

      0b85ca22878998c7697c589739905b218f9b264a32c8f99a9f9dd73d0687a5de46cc7e851697ee16424baf94d301e411648aa2d061ac149a6d2e06b085e07090

    • \??\c:\Users\Admin\AppData\Local\Temp\0d1yvqv5.cmdline

      Filesize

      349B

      MD5

      31232df2bf51f33a79c6a8009ed0247d

      SHA1

      395296cd5ad05f713ca4b606bd24e51417382f27

      SHA256

      c36c4076110c98aba13d1170af5266de4189b8724e3d41e15c424eb565f23439

      SHA512

      445f3025afaa4bd5c24abdd69f40b58ff72e354b2137a9bcb62d52253cb6fa836510654609a185b278525032e30188a344db089be6fc36c43cd3abcd2a5b8ed0

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC129.tmp

      Filesize

      676B

      MD5

      5e8c01682d4590206b2c48853ec17ce5

      SHA1

      713f4937ae783be26beafcf482e70e47c19ef1e5

      SHA256

      1a8abac40555723e2dcbc24b7565c1bf6ed615871b538e53430c597a002a38d9

      SHA512

      01eedfde8a7a7de64e16562644fdd7511ff673a70a04a8df6401ce205f0daf85540660784bcef2bda42d9b33a6470ce7f2fabc59c6f9e2e008b37bf42e55060b

    • memory/1320-19-0x0000000000CC0000-0x0000000000CD6000-memory.dmp

      Filesize

      88KB

    • memory/1320-3-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

      Filesize

      9.6MB

    • memory/1320-0-0x000007FEF5F5E000-0x000007FEF5F5F000-memory.dmp

      Filesize

      4KB

    • memory/1320-2-0x0000000000290000-0x000000000029E000-memory.dmp

      Filesize

      56KB

    • memory/1320-4-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

      Filesize

      9.6MB

    • memory/1320-1-0x000000001AE80000-0x000000001AEDC000-memory.dmp

      Filesize

      368KB

    • memory/1320-21-0x00000000002C0000-0x00000000002D2000-memory.dmp

      Filesize

      72KB

    • memory/1320-22-0x000000001AEE0000-0x000000001AEF8000-memory.dmp

      Filesize

      96KB

    • memory/1320-23-0x00000000002A0000-0x00000000002B0000-memory.dmp

      Filesize

      64KB

    • memory/1320-24-0x000007FEF5F5E000-0x000007FEF5F5F000-memory.dmp

      Filesize

      4KB

    • memory/1320-25-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

      Filesize

      9.6MB

    • memory/2784-12-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

      Filesize

      9.6MB

    • memory/2784-17-0x000007FEF5CA0000-0x000007FEF663D000-memory.dmp

      Filesize

      9.6MB