Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 01:06
Behavioral task
behavioral1
Sample
fb1268b211f329c33cdd2b2de809657732042cf0056b45e85f948beb7219e09b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb1268b211f329c33cdd2b2de809657732042cf0056b45e85f948beb7219e09b.exe
Resource
win10v2004-20241007-en
General
-
Target
fb1268b211f329c33cdd2b2de809657732042cf0056b45e85f948beb7219e09b.exe
-
Size
903KB
-
MD5
347506ed49af315cfdc27220fac57622
-
SHA1
cbee3288a973a152a98478412e9cbef4b994a397
-
SHA256
fb1268b211f329c33cdd2b2de809657732042cf0056b45e85f948beb7219e09b
-
SHA512
1077da878b4f8adada977bae4b8a8207e6d154335b571bd3d15551b6966ab48cc5808a2d6c4060da31290fa203b34eb01ad86b2e1c571e9d0d2e68db99587c1a
-
SSDEEP
12288:VUzyPotpL82hF457dG1lFlWcYT70pxnnaaoawkRVcTqSA+9rZNrI0AilFEvxHvBE:bcI4MROxnF1LqrZlI0AilFEvxHiksG0
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3044 1620 fb1268b211f329c33cdd2b2de809657732042cf0056b45e85f948beb7219e09b.exe 30 PID 1620 wrote to memory of 3044 1620 fb1268b211f329c33cdd2b2de809657732042cf0056b45e85f948beb7219e09b.exe 30 PID 1620 wrote to memory of 3044 1620 fb1268b211f329c33cdd2b2de809657732042cf0056b45e85f948beb7219e09b.exe 30 PID 3044 wrote to memory of 2988 3044 csc.exe 32 PID 3044 wrote to memory of 2988 3044 csc.exe 32 PID 3044 wrote to memory of 2988 3044 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb1268b211f329c33cdd2b2de809657732042cf0056b45e85f948beb7219e09b.exe"C:\Users\Admin\AppData\Local\Temp\fb1268b211f329c33cdd2b2de809657732042cf0056b45e85f948beb7219e09b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rzz0733v.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBE9F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCBE9E.tmp"3⤵PID:2988
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5784a36bdf851ca49a858cb62b59fd856
SHA1e98eac2f6cc4c55dcf85f376b736a92ff6a845be
SHA256cef406a510fd6bf0bc6bda119cb95b2a9893b4b40633878ce4d0c99646273927
SHA512d468b946edd081c81253a916893c3750a4090a0c462fe85b1b4d5bab99011ddf1ee5bf1aecf0665022240f5acb37d29e776bf387b5bc4d6bfdc422085c1f9262
-
Filesize
76KB
MD554f2f399b6380f5afed851f80d413345
SHA1e6cba145e3c6e44b7adf0b01b510fab28444005d
SHA256b3124db8440b6d6404ec813347ba2825056520d491e1f9507a5b7ff4593a3e9a
SHA51232088b5b3f4f492f6de00e1990950f1e75db936f2945844e5aa6ff39a7fb9f9baa8a8ba62c461dd83e2425f683ef7efa682c4f026d775528860f95366c94b4bd
-
Filesize
676B
MD5919f74166b9a459f2bbe7b56997b197f
SHA1b4664af4c204087eb7173b07bca5ab82cf5187aa
SHA25615cb98eef9d6ded919a2df605f00114f6de8b09c9512b7eb420d193f1de65471
SHA512249ace7066c32a732a9dd6c78351a49d11cfb253e94569690c4e2544810c8a8974d2c6b3a23a931c76ab902bdb4244af11d0b6dcdd13e436b8cee2d7cc482162
-
Filesize
208KB
MD56011503497b1b9250a05debf9690e52c
SHA1897aea61e9bffc82d7031f1b3da12fb83efc6d82
SHA25608f42b8d57bb61bc8f9628c8a80953b06ca4149d50108083fca6dc26bdd49434
SHA512604c33e82e8b5bb5c54389c2899c81e5482a06e69db08268173a5b4574327ee5de656d312011d07e50a2e398a4c9b0cd79029013f76e05e18cf67ce5a916ffd9
-
Filesize
349B
MD5d06af044f8eeec028b30af69280b85b7
SHA1952c9928b8702b2d161ad99659c7a051a5276ae1
SHA25649377ebfc32c7701864ea379b0420bb104a5124132624f356076b028d1cf98a1
SHA51237b06900083d89e11f1b6292ee23f7fbc9f239a4ac65438a3dd02bbe27a99e8b89b8a44762dc65a9383853609782f48009e2a27f29b41d28e14a274ef5b7c2a4