Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 01:27
Behavioral task
behavioral1
Sample
e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe
Resource
win10v2004-20241007-en
General
-
Target
e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe
-
Size
903KB
-
MD5
50b929d34d4b8d8a1403372fa7c608cb
-
SHA1
a1edb9952c197496edc5455e5be1d8af886bf3ce
-
SHA256
e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc
-
SHA512
825a59aabe859826d43f60785d6592948cfbb971a669f10ffe51439ef23c301c06ab63e0929a30b8abb4be558410de7e7a3feac894a108d410472a18da6af39d
-
SSDEEP
12288:48shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvB1:J3s4MROxnF9LqrZlI0AilFEvxHiXo
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2804 2484 e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe 30 PID 2484 wrote to memory of 2804 2484 e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe 30 PID 2484 wrote to memory of 2804 2484 e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe 30 PID 2804 wrote to memory of 2732 2804 csc.exe 32 PID 2804 wrote to memory of 2732 2804 csc.exe 32 PID 2804 wrote to memory of 2732 2804 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe"C:\Users\Admin\AppData\Local\Temp\e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d5x8vkg8.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES77D0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC77CF.tmp"3⤵PID:2732
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ab4b1569c7da093f963687623f5086cd
SHA1b29609bc0334808f993d423ce6f839dd8ab6c56f
SHA256aa467a3b712fd64b7aa2e252f17a43c34a67d7c8a8ecd41078b7589bc2c55fe4
SHA512a1d011e053d89abe7e4015e5396c904f0cc856dbf9d049b5605106725639f51ee6bd01bf84377134b2a5e9361559e26b706bdd8a314ab05d65728c5532624ef8
-
Filesize
76KB
MD5bf8b60de2ede41ad6dae4c21cc94523a
SHA11294dee3dad1f24318c5e69eb2fa856be7b1633e
SHA256abb06102c81797bc9f1c6d92d148ddebc19431ee50816c883218f38322c55d5a
SHA512c23ffd77e01fc43fd4b054aaa8975f064bdac1fcc138d4893f604fa8b06a2e5a5e22538bdfce7c6ca4f747996f168bc77b16bd7a1f9e231635188de9407e9633
-
Filesize
676B
MD5c2509c98c9caa96e02b8d24eafcc7c6a
SHA14e63536b76148f81fe9f3ca81fbe70f88d9671a3
SHA256506acc01add544e78e7c2b8e065397f1b8d8bcd595d4e2444c1e2c34aadac890
SHA512066c6827b4294c2669660712cdde45c7c8041270e8416c5377d58b905bffa7f32d50ac6a1daab111eaadea30228dea43aadd8596d8cfe152f52902f15df05ef2
-
Filesize
208KB
MD56011503497b1b9250a05debf9690e52c
SHA1897aea61e9bffc82d7031f1b3da12fb83efc6d82
SHA25608f42b8d57bb61bc8f9628c8a80953b06ca4149d50108083fca6dc26bdd49434
SHA512604c33e82e8b5bb5c54389c2899c81e5482a06e69db08268173a5b4574327ee5de656d312011d07e50a2e398a4c9b0cd79029013f76e05e18cf67ce5a916ffd9
-
Filesize
349B
MD5abf28dda0c93c964c034d12768491134
SHA1b6ca4c0a0b4372d451ac2002c9e90f93d5bd149d
SHA256ec30c6a8b55f41592ea76cbea5d1f256daf017ea1ccca10f939807036da7a8a8
SHA51238bd38f71772f6e7deaa5e96f3775a3e6b87c528c676f15c597a26af0362455f6a9564232266ec2e42d5516f5f15a0634b86dd046a2b7f5254ac5df1983b79d1