Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 01:06
Behavioral task
behavioral1
Sample
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe
Resource
win10v2004-20241007-en
General
-
Target
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe
-
Size
3.0MB
-
MD5
55aa8f71dd8e53e8272802adbcfcb2b6
-
SHA1
b02f77ad4283f160b4702205d2107187a6897c54
-
SHA256
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768
-
SHA512
2301db40956d529233e4c47668366cad91c2a77c2589a78c08e1e051f4bb6b609f56e2f8980a7672bf4eb7f837262f03897540eb1bef8986665cad3da736e2db
-
SSDEEP
49152:o+fEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmkcrZEu:o+ftODUKTslWp2MpbfGGilIJPypSbxEW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2988 2088 2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe 30 PID 2088 wrote to memory of 2988 2088 2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe 30 PID 2088 wrote to memory of 2988 2088 2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe 30 PID 2988 wrote to memory of 1980 2988 csc.exe 32 PID 2988 wrote to memory of 1980 2988 csc.exe 32 PID 2988 wrote to memory of 1980 2988 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe"C:\Users\Admin\AppData\Local\Temp\2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\izwo5h96.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8CC6.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC8CC5.tmp"3⤵PID:1980
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9da8b93c00a1b6bc9e5935a9f8d6126
SHA1f89519b4b2ed372bbd0fd9ae65563d967d445951
SHA25602e6968c2e5193c09149821e19a744c3747931b3591e8b5f0c60c0fc2cf43aa4
SHA5129f935e89416b4570f22997a9eabec5b192bd6b8f9b8d9f595c7aa88bfe21c5f0c75d1b86501a6512303756669256bccf85246e33ab67ffcb72eae84dac52aa33
-
Filesize
76KB
MD5f32121748bf45b6084ba0d3b84260132
SHA1e3503121f80bbe228265308d6d31afdef61aa1af
SHA256ab301c0002f71814385d186878f5d88b0bfda1122213e74b3a3daf43aad04134
SHA5125cbe4dc423bd93baf42aa7cf089bb2ba762ee8a41802b7db9326623d44fa1d979b65fa86e2b742a834d9964925751c91c4019fc202692fec2d306a35848858d4
-
Filesize
676B
MD5a5ccad693b7051961c622a1432e12545
SHA1ed575d7c9167c60dd6efd76c14fde3edb70bd290
SHA2567ea521adacb7741690ec7a6543bacb1e53f990551c1e34299218a27d3d04a577
SHA5123c09012f9ec72e83869497e0dae7dabee85f3624a45c161e4433a6d4e150342ec9e43790f4400f52d8a88fd6092dbf9ea3dca8af79cfaaaa34c91c5498b6ff52
-
Filesize
208KB
MD5be563d305342c18be33a73aed4bc8daa
SHA11c4085e7b2758ff5e2478936ff5898e79c165fa7
SHA25650b6511769e8e323ef2191bd75183bb568cb8b7e5c63d4e62e949bd6a967d296
SHA5123470a6881fb9d28588d4566c18e1884ff44c31495ad8cffad6b5469cb359c6dd2f891220eb54ff68bc0350adbab96dabaa295bb601ff747d59069ced4296dffa
-
Filesize
349B
MD51da84c408abc65675e82a91f83d7f7e8
SHA1be614ed5a4ec3ad3ba45d10b393e918be6e91db8
SHA256939c9c8231af0864dec328b49889fff1401299d47300148b6edb0abed74628a0
SHA5123bbd2f8e54ab91604dde7ff1f9eeede2d667788cd2907dea6f98f9fe477bcb8e8d83df821022e25e6641b15acaedddd5ff4bb49805fcd10815f0217c3ca221d6