Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 01:07
Behavioral task
behavioral1
Sample
afa0f8e585262f6b696c02f8e6df08307269834a9c84a609e89c6083ca81498e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
afa0f8e585262f6b696c02f8e6df08307269834a9c84a609e89c6083ca81498e.exe
Resource
win10v2004-20241007-en
General
-
Target
afa0f8e585262f6b696c02f8e6df08307269834a9c84a609e89c6083ca81498e.exe
-
Size
910KB
-
MD5
8a4767d2b571133c41b8bb96e170d4c4
-
SHA1
e2c309692c8cd1b75a86c6703b925a98198f13db
-
SHA256
afa0f8e585262f6b696c02f8e6df08307269834a9c84a609e89c6083ca81498e
-
SHA512
176ac9213b0391391b9f5c7f80749bc9eb67b57e14155e4b33af9ca34f6eeda022ae2abca363ee28316aed5c670c9406e868b7ad6044b899627c98c56a929c8b
-
SSDEEP
12288:h5STYf+qnR7Fkxh7dG1lFlWcYT70pxnnaaoawASIh4JWVGMrZNrI0AilFEvxHvBl:nhg4MROxnFp/iJkrZlI0AilFEvxHiQ3
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2724 2076 afa0f8e585262f6b696c02f8e6df08307269834a9c84a609e89c6083ca81498e.exe 30 PID 2076 wrote to memory of 2724 2076 afa0f8e585262f6b696c02f8e6df08307269834a9c84a609e89c6083ca81498e.exe 30 PID 2076 wrote to memory of 2724 2076 afa0f8e585262f6b696c02f8e6df08307269834a9c84a609e89c6083ca81498e.exe 30 PID 2724 wrote to memory of 2212 2724 csc.exe 32 PID 2724 wrote to memory of 2212 2724 csc.exe 32 PID 2724 wrote to memory of 2212 2724 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\afa0f8e585262f6b696c02f8e6df08307269834a9c84a609e89c6083ca81498e.exe"C:\Users\Admin\AppData\Local\Temp\afa0f8e585262f6b696c02f8e6df08307269834a9c84a609e89c6083ca81498e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lwddooxd.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB971.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB970.tmp"3⤵PID:2212
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee2d2c49bc5d0c873fecd6a420042ab3
SHA1486404fdece429f7d45106389c4d457a2bf51ad1
SHA2561d6d466e6ec98c3ca7abe960a39818270a34cb1f5190f8ec105cfe75a6290ad9
SHA512f3a7ce3ce02075c1c53b99ff809849a37d1574726f2dfd72447d81573e9d03fa027dba5a08a4060bdecef6db12dc882c2fee9a5485da4ef3f3ba0ee0d0323d93
-
Filesize
76KB
MD53a1e59af19132f1e1be63151c0a47c24
SHA1a2d673c68ca4b91c7640912852b6b3b05c1966d4
SHA2561e66227913323ca5f535712810fa4e6b367159c34930bd589faf6a2e812d5118
SHA512085b14f98f1e32889f9ace6f6482210535f1af108684f21680ab5290936cae5b1378050946313b386c87f63ec43501296f38454eb6da7423fe0f81650dae5d4e
-
Filesize
676B
MD51f8311cf143b1208ac377c622b9110e5
SHA12d5e49a1b0e03a49608e904bddc9d31fe73a7844
SHA256710e5dd4dea9675c3342b3ff7d881bd3a6304032704bcd6c52e3d7949ab6520a
SHA5125da1707a31a44e6065cbc3a51387432a61495ca482acb0cf6af3e4ed95a5553926ea197b9cd34d62ff69363eb6d0348930783f0e4fc3f3623dd1fb88ed8da821
-
Filesize
208KB
MD5250321226bbc2a616d91e1c82cb4ab2b
SHA17cffd0b2e9c842865d8961386ab8fcfac8d04173
SHA256ef2707f83a0c0927cfd46b115641b9cae52a41123e4826515b9eeb561785218d
SHA512bda59ca04cdf254f837f2cec6da55eff5c3d2af00da66537b9ebaa3601c502ae63772f082fd12663b63d537d2e03efe87a3b5746ef25e842aaf1c7d88245b4e1
-
Filesize
349B
MD5f0fd1845b8b5a014b7e19d7157465120
SHA13b8d131330e34ed253952bf01b3265e4e70f80b9
SHA2560da94fa6f7a3187821846cf5c6bbd346415d9b83623cf5e011c314b1de55af55
SHA5126bee3c658a401085bc59be68f77234281977c61f14912948056e2921ba0dd7f7244cb7611365da47a38c6616017c0275e42e48b69d07b92f798ce218a27bb956