Analysis

  • max time kernel
    69s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 21:49

General

  • Target

    2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe

  • Size

    913KB

  • MD5

    43f4d0b001bb03af9f2501e1b55d7fc0

  • SHA1

    cd17274001e80cde3c281d66ed6be511d01195d3

  • SHA256

    2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1d

  • SHA512

    ca2ef22b3f50b8b3d07974a1febf63f1377c905c88c4864fe519c4a302b380015d5f8474da89c5fe0d5be47951a1c403c61ed83f450476392feabe8ab6bcff59

  • SSDEEP

    24576:U+5T4MROxnFm5bHKTlQorZlI0AilFEvxHiBs9:950MiAorZlI0AilFEvxHi

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe
    "C:\Users\Admin\AppData\Local\Temp\2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2v22gvkp.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF2C9.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCF2C8.tmp"
        3⤵
          PID:2660

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2v22gvkp.dll

      Filesize

      76KB

      MD5

      89e1c94912c359830439050ff546baf1

      SHA1

      3c496256bacdf40f9662eecf133a6d5434ed42fb

      SHA256

      6dbd01ef5e9f9e165feeed732fea5a27088395e418dce3b2fe3c8cc99ad4084f

      SHA512

      af5c24f0454b9d19d92502fa857a9b19036cac8faa48882052596b1532ef96a2ad5ebc7f870c5e023e46bed6b9ac2077f81aece1276fba3210d54dd671fb24c7

    • C:\Users\Admin\AppData\Local\Temp\RESF2C9.tmp

      Filesize

      1KB

      MD5

      e5f2a3571b1f442247c1fc8f49853bd2

      SHA1

      6a280535b18a98232a4e3f28bc1be3e845b4efc4

      SHA256

      2a34e503b32e21a4626594598ad46916e4e2f6e1a456ec42c75c4a7167d56812

      SHA512

      cfd999c50086fa5a09df1ece8ac05f3089c069e3e03a1425601a4747b2b398ba9106ecc97a98a2fa45c8f02107d05efb8f13551af2075c8bd5d2ad3243d32175

    • \??\c:\Users\Admin\AppData\Local\Temp\2v22gvkp.0.cs

      Filesize

      208KB

      MD5

      c555d9796194c1d9a1310a05a2264e08

      SHA1

      82641fc4938680519c3b2e925e05e1001cbd71d7

      SHA256

      ccbb8fd27ab2f27fbbd871793886ff52ff1fbd9117c98b8d190c1a96b67e498a

      SHA512

      0b85ca22878998c7697c589739905b218f9b264a32c8f99a9f9dd73d0687a5de46cc7e851697ee16424baf94d301e411648aa2d061ac149a6d2e06b085e07090

    • \??\c:\Users\Admin\AppData\Local\Temp\2v22gvkp.cmdline

      Filesize

      349B

      MD5

      ce403edf34249f756eb51718fc2be63c

      SHA1

      837b46fecd9da2a8e34a6d90c091cc5b493c697b

      SHA256

      31322f141ab336ad290d0c1c46290ef5ef1d7491b66aa6ba955f169a940bcabd

      SHA512

      d45af08563f254917cb3ab1f7bba654ef1727d87a90062ad5f0a90c94f9d99fe87fe36321758f38c5f1779cca7a95eeb10ed3a8de6239e38e1f2b673fcdc3e76

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCF2C8.tmp

      Filesize

      676B

      MD5

      b26049d73fe9baad262a483a040c82e4

      SHA1

      a2f45d1c525652e9811a3a53e82df9a5438fadb6

      SHA256

      75fb64f5d0f441803728a9473b6164d6454377dc750f577583af75bfcbf4d30a

      SHA512

      ad32261eb9ae0c3782570d175220d93dc1ed70da1925efbe91c10e04d2928dd8c3224638321100e933119bde2f16f963628020c18fa59bff8674554c7a8fc5fe

    • memory/2740-17-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

      Filesize

      9.6MB

    • memory/2740-10-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

      Filesize

      9.6MB

    • memory/3048-2-0x0000000000380000-0x000000000038E000-memory.dmp

      Filesize

      56KB

    • memory/3048-3-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

      Filesize

      9.6MB

    • memory/3048-1-0x000000001AEB0000-0x000000001AF0C000-memory.dmp

      Filesize

      368KB

    • memory/3048-0-0x000007FEF573E000-0x000007FEF573F000-memory.dmp

      Filesize

      4KB

    • memory/3048-19-0x000000001AF10000-0x000000001AF26000-memory.dmp

      Filesize

      88KB

    • memory/3048-4-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

      Filesize

      9.6MB

    • memory/3048-21-0x00000000005B0000-0x00000000005C2000-memory.dmp

      Filesize

      72KB

    • memory/3048-22-0x00000000005C0000-0x00000000005C8000-memory.dmp

      Filesize

      32KB

    • memory/3048-23-0x000000001AF50000-0x000000001AF58000-memory.dmp

      Filesize

      32KB

    • memory/3048-24-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

      Filesize

      9.6MB

    • memory/3048-26-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

      Filesize

      9.6MB

    • memory/3048-27-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

      Filesize

      9.6MB

    • memory/3048-28-0x000007FEF5480000-0x000007FEF5E1D000-memory.dmp

      Filesize

      9.6MB