Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 12:36
Behavioral task
behavioral1
Sample
b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe
Resource
win10v2004-20241007-en
General
-
Target
b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe
-
Size
913KB
-
MD5
f75019b8ddb47bfae0d96f1cf02c0191
-
SHA1
90c558dce5935ddc5ec01bfa6a37239d2a8fbbae
-
SHA256
b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35
-
SHA512
f3d2fc5a78fa07554472a7617493fbdd4758f72d8f542401fc45a8246aded6a68ccf6e10b62632e82ac4910b760332c640436d9ec432fc98cce52e8a6d23b02d
-
SSDEEP
24576:U+5T4MROxnFm5bHKTlQorZlI0AilFEvxHiBs9Z:950MiAorZlI0AilFEvxHiU
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
Processes:
b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exedescription ioc process File created C:\Windows\assembly\Desktop.ini b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe File opened for modification C:\Windows\assembly\Desktop.ini b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe -
Drops file in Windows directory 3 IoCs
Processes:
b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exedescription ioc process File opened for modification C:\Windows\assembly\Desktop.ini b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe File opened for modification C:\Windows\assembly b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe File created C:\Windows\assembly\Desktop.ini b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.execsc.exedescription pid process target process PID 2052 wrote to memory of 3576 2052 b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe csc.exe PID 2052 wrote to memory of 3576 2052 b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe csc.exe PID 3576 wrote to memory of 208 3576 csc.exe cvtres.exe PID 3576 wrote to memory of 208 3576 csc.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe"C:\Users\Admin\AppData\Local\Temp\b53c4527977e96dfa132318944a51f6e309dbbd4396276a0500deaf8178a4e35.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\kghkaukr.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES80AA.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC80A9.tmp"3⤵PID:208
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5207b1dbb4b24b8c9b06935d85b4e0557
SHA1c59c3de59acb5dc7d8c9de2583398e5180b95383
SHA256d5bf569b94e66d92e32d5eb020d53bfdc9d92d365e5dc9bd21676b681427957c
SHA512fca1195d33e721d0003a7dad1ce5bae3a67a95f70098c63eeec62b7c4253e46b6e970c746c1224e5f878b0a3c6553bf130c020330efcfc372ef228b72612589f
-
Filesize
76KB
MD5391091eef0d99547536609df414a6571
SHA1c52b823cd2b82f2e0278e77d24630ce1dd41d8df
SHA2562c2c897a5e06845ddce0dece0887afa0222a33b2d2218f5f2bf305525dd54d72
SHA512938bd8fb207bb6e681a5eccf636e8284eb5a73c8091a619e106cd34d9be70c166742682f0cd010039fcd714b71ad44c9166bd52169d7241351160920f38a02e3
-
Filesize
676B
MD557631059a619707327d9e2d94bc89a68
SHA19356f7a32b62804bc37aea400964225194096fa5
SHA256dd4e19904cc5e263ee03e1469a2661d6775d7bb07aae0fd18472fcbe68e6a2b5
SHA5122af4bfc91b38f2702ed1b34cd250f95d0d83f407cb611c303432e46ff5d1eba250f82a600eb0a4ac56a26c03d15f6bb962022bebc2066e4b12ee9732e261f639
-
Filesize
208KB
MD55bd6743a0d44561a6411e090199cdc1b
SHA1b77072b2d169c4bf61bc4141202c38fe85b71aae
SHA256c2833bc112ad9dc7851c6a48a5e8d70953cb0b5b87d1903bf728509c81554fa3
SHA512dbb73074903274dbec4d0b3ebaaa6655afee73aeecfc709edaccfcc143ba46ec737ea29edf6bd91b530d0562ff7d6e94db2e941860c19273193da8c0cbd5eeaa
-
Filesize
349B
MD5addec11925f40f182d3c449d4871e89c
SHA1c8c820932f7df25b491524ee06728ba61b56690c
SHA256bcb4de2d3803f7afd42f3042ece76b500a877c8762b5820e0b3821ef1abb02ea
SHA512d861ea8bcef71a84b4577ff845e689dc61c3155ad6e3ce1685afc19e333c738cbe4de1d963de3e197e026289b7c274812309c1528d242241ac7fb6e2c458bc24