Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 01:06
Behavioral task
behavioral1
Sample
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe
Resource
win10v2004-20241007-en
General
-
Target
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe
-
Size
3.0MB
-
MD5
55aa8f71dd8e53e8272802adbcfcb2b6
-
SHA1
b02f77ad4283f160b4702205d2107187a6897c54
-
SHA256
2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768
-
SHA512
2301db40956d529233e4c47668366cad91c2a77c2589a78c08e1e051f4bb6b609f56e2f8980a7672bf4eb7f837262f03897540eb1bef8986665cad3da736e2db
-
SSDEEP
49152:o+fEKO3T5adZKM0sz5otCeEvsDKx+msbfGGW8wlBKJwAypQxbxEo9JnCmmkcrZEu:o+ftODUKTslWp2MpbfGGilIJPypSbxEW
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1300 wrote to memory of 1368 1300 2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe 82 PID 1300 wrote to memory of 1368 1300 2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe 82 PID 1368 wrote to memory of 1356 1368 csc.exe 84 PID 1368 wrote to memory of 1356 1368 csc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe"C:\Users\Admin\AppData\Local\Temp\2f1f1453e9b25081aa85cc14188a17d39bad9380a303ddca391e1670022c5768.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\n7oy31kn.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA9DD.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA9DC.tmp"3⤵PID:1356
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5286aa98bc1a7b3b59f95b07cccfadc3f
SHA1e22e33338c798211e6748377b5e11af7c7dbdf34
SHA25643ba821c89f0d81ff5fdaa3bd37acbc76e1e52e1fdc3103042b073e5611bd6ad
SHA512c702d28e45db9e7803d5adda26e06e412e7cbb1c13fed8d42674cb48c5e35d278ee3574255bc83afe92099f1895dd7b807e1b43441798ce2374bcde3eb8332c4
-
Filesize
76KB
MD50fe1dfeadda26b22ed75ac3c6adfa159
SHA163d2a970a16b04a6c69ee5e0c6c6600dabeb3430
SHA25639d82b62011bc6d4ab9f19ee9188c0702eb112528278fd1abc8ee671eefd054e
SHA512fe2c90d7f542459e424ea1ea6f7aed8b4307781039ffc130b083f0a2ab752c37cd4681194d2a68235fc4782e90fb8e20f19b9d4e535fed7b76de8525e71aa1c5
-
Filesize
676B
MD532febf4b23d7948d3b870036e4cfd3b2
SHA17be5902807cdf768f89f4d2f3fdf15404c277069
SHA256cc19905415c3d03378560d59272a61467139ba329e14348cdd703b2f2d81a9d3
SHA512bf5b7c300d193937ce879ed1c13fe895ee809305db1274e237a877db9dc3f51bda87e907f35722196687de5b615b31cd4193e13ea9e85c4bbfc32721e34ba7e8
-
Filesize
208KB
MD512606a76da40180f8da902f93ced24f9
SHA164bfed89c9e45171fd4395e81317b243efa07d00
SHA25686ed6c41cfefb97ef289f1f28befe59b0b35f611faa97b2f9382762d53b9c92f
SHA5125c98f5d95d91714af476bcda7dffc39f7eef0f541eca22ef34c3f7f1cb315d61d3b815935633db6846b26dcbb6b41f236ac8e40adfc768afe629c2ef73e3322c
-
Filesize
349B
MD5e69205aab478de26b0c7da902731628e
SHA13663ad244c648e8e0e5f774f4d63d43e88ab55df
SHA256439f6a2ede0669c2e9eea410839b06ab16473b76672eeba3ebf0c1f167ba391b
SHA512ff0b6f413eaad1eaf72f343e25d2efc1b353571391192cae7d3657102bdee498f06dd478983ec36a201bc3c4edfdabc7aa33d287df0e2b329228bd678447b71d