Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 21:49
Behavioral task
behavioral1
Sample
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe
Resource
win10v2004-20241007-en
General
-
Target
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe
-
Size
913KB
-
MD5
43f4d0b001bb03af9f2501e1b55d7fc0
-
SHA1
cd17274001e80cde3c281d66ed6be511d01195d3
-
SHA256
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1d
-
SHA512
ca2ef22b3f50b8b3d07974a1febf63f1377c905c88c4864fe519c4a302b380015d5f8474da89c5fe0d5be47951a1c403c61ed83f450476392feabe8ab6bcff59
-
SSDEEP
24576:U+5T4MROxnFm5bHKTlQorZlI0AilFEvxHiBs9:950MiAorZlI0AilFEvxHi
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
Processes:
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exedescription ioc Process File created C:\Windows\assembly\Desktop.ini 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe File opened for modification C:\Windows\assembly\Desktop.ini 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe -
Drops file in Windows directory 3 IoCs
Processes:
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exedescription ioc Process File created C:\Windows\assembly\Desktop.ini 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe File opened for modification C:\Windows\assembly\Desktop.ini 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe File opened for modification C:\Windows\assembly 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.execsc.exedescription pid Process procid_target PID 1604 wrote to memory of 4492 1604 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe 83 PID 1604 wrote to memory of 4492 1604 2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe 83 PID 4492 wrote to memory of 2024 4492 csc.exe 85 PID 4492 wrote to memory of 2024 4492 csc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe"C:\Users\Admin\AppData\Local\Temp\2a1de2d43b9ce30d24fb2950b24626bbd372433422df337f8bbaa1caafbefa1dN.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ntx5-lav.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9338.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9337.tmp"3⤵PID:2024
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD570ed6f1ca02102f76ec5ffbe7d809697
SHA1c18d032f57e1a04e39ec168a0fdb3acb1fb25026
SHA2569c4746b112c590c5597690865d983b3df43abbd92da24a484018a387933d7460
SHA512fdd037f689fc286ffb43ef6484da1db593d9cc1cf63a91de1c67474e556a65debdca03066cd4ee576a7ec4b379d84b8f498af45f9e90255ba11c7cb970965c44
-
Filesize
76KB
MD54199b8818fef9f9405bbff31212d6984
SHA1df7ed0e670f3160ab6a7e781806794477360418f
SHA25663fe1a5ee471906cb04f759c078f9bb0673a77a51943566c8ccae8de0f20a722
SHA51222ef95c5be98c34728a12704b87829784b7ffc9c11fdbd7822e90cce4355a6183b3e85e1320c83c3c8683b2e0fdd12b1200b9257a547c3606bd603376ea58eb3
-
Filesize
676B
MD5b6cb04ee513beb7e7c598d2dc66e6b1b
SHA1f491df1f6160d2effea65aa02f9c6013faf27829
SHA2564d69b950451634b88acdb11ecbf16c24384828dd2190374d47d01be4189a3bb0
SHA512848e5789ef8108f516f88bb29ef1e68c30a3401da3079ff24e7263fe1960665a52130f9e82d1b5c2d65918ae24c4b98284925ac1bb35f421a4d3b642ca47a2f3
-
Filesize
208KB
MD5ad3fb6157917742e2291c095039d56af
SHA1239c2b918f7a176e38c4338cb3877606158a95bc
SHA256715067a2205e2c21a041f4de2ae9f0a9e44e52eac1109bc8a45b8ff0445c30c5
SHA512ac6c0683daacc1a4bd921ec3fb5727c26b047c9cc2123e948fb32ae1dcba989e23b0d6ab2e148045db23b35ad53acf4c16f7abfd4a7e26e3483a39af05c50c84
-
Filesize
349B
MD54c18055c39df8b8b626bb86da4062ab6
SHA155c25609465afc1c9949cd559b89247f8772a8db
SHA256b6f0d5b7fdfcebe311e25f46f8352fc118dda7522048cbbf0d9a5d78d9b96b14
SHA512bdea80f4665d6f71aed6e010c2df8a39bace119e70b2908eb63276aff4f43ff1118bb124f1d39255d445eed24de3a0d46083381883129b30d51c0fcccd7d31f3