Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 01:27
Behavioral task
behavioral1
Sample
e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe
Resource
win10v2004-20241007-en
General
-
Target
e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe
-
Size
903KB
-
MD5
50b929d34d4b8d8a1403372fa7c608cb
-
SHA1
a1edb9952c197496edc5455e5be1d8af886bf3ce
-
SHA256
e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc
-
SHA512
825a59aabe859826d43f60785d6592948cfbb971a669f10ffe51439ef23c301c06ab63e0929a30b8abb4be558410de7e7a3feac894a108d410472a18da6af39d
-
SSDEEP
12288:48shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvB1:J3s4MROxnF9LqrZlI0AilFEvxHiXo
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe File opened for modification C:\Windows\assembly\Desktop.ini e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe File created C:\Windows\assembly\Desktop.ini e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe File opened for modification C:\Windows\assembly\Desktop.ini e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3560 1924 e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe 89 PID 1924 wrote to memory of 3560 1924 e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe 89 PID 3560 wrote to memory of 912 3560 csc.exe 91 PID 3560 wrote to memory of 912 3560 csc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe"C:\Users\Admin\AppData\Local\Temp\e15c3ff9de2290626cc24301d496ff18a89adb9832a93c3d17cd9e4a1484e8cc.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kueqjoiv.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC67D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCC67C.tmp"3⤵PID:912
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ecd2af920a0ca8723ba4bb4e47ae4468
SHA175f0a3fe71a76a3283ebacce9201010426b60e1e
SHA25629fa35365e81aeccf9728a96afcfe82a3d5239ec42668f67e96d48a7164ddca6
SHA512346e1bf89f30086f5515ce06a4a8c51abbe834888b877aaa837e60746d695cf913fdffbe397653e881499c07775db3312f3b60a7dac59990a523342bf86eb7bd
-
Filesize
76KB
MD51c9cc27d360ac95205b043b4b50ec0b4
SHA110470fbbf718b8335ca5ea3604eb93dcb49592ff
SHA2569ccebf1e3892b89245e2726a91b6cbbf08be4962e7be6734af86f26087fd524e
SHA51283fafa11152b4c139c5159d1816de2e1a7444421d313c8fb0f6aed319afa5221b4d105be7117e7b6ba499e6c07c479b01b83c9f752001a6f62076ed18d0279b6
-
Filesize
676B
MD51125a4681f82613ed291cad08bcd4338
SHA10bdc26002c03d2a37c98293e3fe0660c58a80ac8
SHA25612fc26563786dd8577efaf53be37f3b225f265c33cc7e383a77ca5c03e0a11e6
SHA51238cb87b0e502e4df2b0e7cead2ed3ce593f6f493ccfb54daac526498393f449702d7e2e98e6bfbab94ac069c5f6f7ec1f93bb8367754e0fab66b13079e9d7511
-
Filesize
208KB
MD54f29881c451b864347626fa4f59fb1cb
SHA1dd5bfc266d163cd171e39c8507658f06eea8b64b
SHA256c0f4b4148376268a66f8ac5a7e4ee98e46c1d4194f44cd847ca55864771008e0
SHA5128fd821a3bc712e566faa3afc4c112ab42138be63a215230feec44170ff79be7e914248d51f518ba17e141511e206b157983fa4428cbda91d8661ebef97c85094
-
Filesize
349B
MD5e5a0c39669f29b9482e8c1276685613f
SHA1ac635a3350d7ff8cfdfaa856e544dbc80520e9a6
SHA2565d645297ecf7e299d43d4776274d7d43f76af23c27b1fc84e9df70c90203d8db
SHA5122ef5bfc6447ba1d142c1e35831b5faeb28feafe4b8be51f7eda14bf8cbf64dac6f93849cd02fa243341fec5b44bb4a7cd2d07432db6f3f972bae95f8bcfc2f50