Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 01:12
Behavioral task
behavioral1
Sample
b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe
Resource
win10v2004-20241007-en
General
-
Target
b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe
-
Size
913KB
-
MD5
82a849e5e33240add085634c9772df1e
-
SHA1
27336da29c5133deafa69f79339dff7d0f639bef
-
SHA256
b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db
-
SHA512
f99d2575bd1eaf887d9698529a7b52460d345676ccd1a34b644605fde62ae4760eaef08cd2c1076ea8b910848075861caec6a781a6496eb7b08cc57314c97130
-
SSDEEP
24576:U+5T4MROxnFm5bHKTlQarZlI0AilFEvxHi79:950MiAarZlI0AilFEvxHi
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe File opened for modification C:\Windows\assembly\Desktop.ini b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe File created C:\Windows\assembly\Desktop.ini b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe File opened for modification C:\Windows\assembly\Desktop.ini b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 736 wrote to memory of 1884 736 b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe 86 PID 736 wrote to memory of 1884 736 b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe 86 PID 1884 wrote to memory of 1872 1884 csc.exe 88 PID 1884 wrote to memory of 1872 1884 csc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe"C:\Users\Admin\AppData\Local\Temp\b5025dda3b0c1c0f96f66acf456e3711df7455d165581a8f7ba295c2191b39db.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wrhzkaqk.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8619.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8618.tmp"3⤵PID:1872
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5107f70329e87cdb7cf0ead421dcc4b90
SHA121c5e898468f99fa52e916c4e73798adc797cf8b
SHA2562bf8f6ad47255f17a7610b6a979c84c33c5591fd99743f85ffaeae7772780685
SHA51267636cf25edb84080870768e9fb15b93b7c7b729de54b1c7d2102cb8f1f46e84071cefa2d69749bb39610008815f5dfd082da8a60e7e2386fbce6bcee1ca02b4
-
Filesize
76KB
MD5fd9e06ea69f43967a7d75a1db0e1a9ce
SHA1c1c988c1b7f17e11c2d1e94e8b5aef340adb097e
SHA2565bb8ffd9fea25d7c5905a6cc3bc42e9f085b325fa952593e7d4cd3c6b2bcf7df
SHA512912208a626dfd2122274203b08604b0f6ea1bb9ea4f9eb82a00981bf0af8b2c04bd03408e4a5d8b8db3ea15b4f7334331fd9eefde0f475530e64280c750ba2f6
-
Filesize
676B
MD54463751c132966dc63c109ce3aad1f58
SHA158a4db044738a53106831da51f02ff779e7008a2
SHA25631535d60d92adcb26bf17bc79e236583cbe1aa98493259efc01da703249969a6
SHA512c0d53040efe2474f87fdcfa71d15adab40ac44d9a5d7a5ec2ed53a8ebb222670f4b4349f8d2b29d00ae8dc2334b1a095fd844d3c6bf346d5a4bbfe421561db85
-
Filesize
208KB
MD5b09ccb83bc6da571e866c4ac84074053
SHA1c733974d1bb683a502cfa0369bc27ecf5193c1ba
SHA256b4f6589d48babcd5a33e9360eb051178ff34fd52164c251506973342dbcd6a6d
SHA512e5cf8654676930fc5d2d91cc565f9e29d7e25870306b508db9f5bc9d5b72a92ffabdf5976261c99b1c2062d066cb367e92513f4d8793a60a628cbb949e3bc451
-
Filesize
349B
MD56fdfb5b95673bcfa6aa9d19b7f4bf6a4
SHA1d2aadf1647cdebb3234d27d0a8babeff487e9cf2
SHA256fa812a79b3a0d4a9f46fe4d0c604644e5cf62fa5c6784ab89616251b0d7fee30
SHA5126cb55fbe0784cc0ef6254eca0b58fd5943289b2242be5fabd908a01b71e5411b4827ba5ef4e8b50271ba5a8a37067ce4314dee25073cdde6c3c269fe4d13ebe9