Analysis
-
max time kernel
69s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 21:49
Behavioral task
behavioral1
Sample
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe
Resource
win10v2004-20241007-en
General
-
Target
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe
-
Size
913KB
-
MD5
43f4d0b001bb03af9f2501e1b55d7fc0
-
SHA1
cd17274001e80cde3c281d66ed6be511d01195d3
-
SHA256
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1d
-
SHA512
ca2ef22b3f50b8b3d07974a1febf63f1377c905c88c4864fe519c4a302b380015d5f8474da89c5fe0d5be47951a1c403c61ed83f450476392feabe8ab6bcff59
-
SSDEEP
24576:U+5T4MROxnFm5bHKTlQorZlI0AilFEvxHiBs9:950MiAorZlI0AilFEvxHi
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.execsc.exedescription pid Process procid_target PID 3048 wrote to memory of 2740 3048 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe 30 PID 3048 wrote to memory of 2740 3048 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe 30 PID 3048 wrote to memory of 2740 3048 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe 30 PID 2740 wrote to memory of 2660 2740 csc.exe 32 PID 2740 wrote to memory of 2660 2740 csc.exe 32 PID 2740 wrote to memory of 2660 2740 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe"C:\Users\Admin\AppData\Local\Temp\2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2v22gvkp.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF2C9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF2C8.tmp"3⤵PID:2660
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD589e1c94912c359830439050ff546baf1
SHA13c496256bacdf40f9662eecf133a6d5434ed42fb
SHA2566dbd01ef5e9f9e165feeed732fea5a27088395e418dce3b2fe3c8cc99ad4084f
SHA512af5c24f0454b9d19d92502fa857a9b19036cac8faa48882052596b1532ef96a2ad5ebc7f870c5e023e46bed6b9ac2077f81aece1276fba3210d54dd671fb24c7
-
Filesize
1KB
MD5e5f2a3571b1f442247c1fc8f49853bd2
SHA16a280535b18a98232a4e3f28bc1be3e845b4efc4
SHA2562a34e503b32e21a4626594598ad46916e4e2f6e1a456ec42c75c4a7167d56812
SHA512cfd999c50086fa5a09df1ece8ac05f3089c069e3e03a1425601a4747b2b398ba9106ecc97a98a2fa45c8f02107d05efb8f13551af2075c8bd5d2ad3243d32175
-
Filesize
208KB
MD5c555d9796194c1d9a1310a05a2264e08
SHA182641fc4938680519c3b2e925e05e1001cbd71d7
SHA256ccbb8fd27ab2f27fbbd871793886ff52ff1fbd9117c98b8d190c1a96b67e498a
SHA5120b85ca22878998c7697c589739905b218f9b264a32c8f99a9f9dd73d0687a5de46cc7e851697ee16424baf94d301e411648aa2d061ac149a6d2e06b085e07090
-
Filesize
349B
MD5ce403edf34249f756eb51718fc2be63c
SHA1837b46fecd9da2a8e34a6d90c091cc5b493c697b
SHA25631322f141ab336ad290d0c1c46290ef5ef1d7491b66aa6ba955f169a940bcabd
SHA512d45af08563f254917cb3ab1f7bba654ef1727d87a90062ad5f0a90c94f9d99fe87fe36321758f38c5f1779cca7a95eeb10ed3a8de6239e38e1f2b673fcdc3e76
-
Filesize
676B
MD5b26049d73fe9baad262a483a040c82e4
SHA1a2f45d1c525652e9811a3a53e82df9a5438fadb6
SHA25675fb64f5d0f441803728a9473b6164d6454377dc750f577583af75bfcbf4d30a
SHA512ad32261eb9ae0c3782570d175220d93dc1ed70da1925efbe91c10e04d2928dd8c3224638321100e933119bde2f16f963628020c18fa59bff8674554c7a8fc5fe