Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 01:20
Behavioral task
behavioral1
Sample
78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe
Resource
win10v2004-20241007-en
General
-
Target
78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe
-
Size
903KB
-
MD5
e01f6c2e3489ec4f372f5e42043c76ad
-
SHA1
ff18a6f8f0535cb90bd1be41c5f751eb7e68c9bf
-
SHA256
78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97
-
SHA512
b7eb8aaf68bc5a91e94bb1889cda2d0c22af3cbf4011134b6b4d86d08ca6e945002f868a3c818fb0aa0e551193863167c874f4780aa93142b7e74768d96dd932
-
SSDEEP
12288:Y8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvBJ:p3s4MROxnF9LqrZlI0AilFEvxHi8b8o
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe File opened for modification C:\Windows\assembly\Desktop.ini 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe File created C:\Windows\assembly\Desktop.ini 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe File opened for modification C:\Windows\assembly\Desktop.ini 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4568 2648 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe 82 PID 2648 wrote to memory of 4568 2648 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe 82 PID 4568 wrote to memory of 536 4568 csc.exe 84 PID 4568 wrote to memory of 536 4568 csc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe"C:\Users\Admin\AppData\Local\Temp\78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\o-xryleu.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBC7B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCBC7A.tmp"3⤵PID:536
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b67a16de9588d200583c418549edb820
SHA1a6ce88a0d4a571d15c7c5cd598c2fae808c62f21
SHA25680b151e3ca7ee0b3f38e150825cc87d88ff0c9f492c546d493d7ef60512bc0cb
SHA512f6c3f6d40d5d2495961eb81d9688db94060bc2c8542acae59ce35004bfb8e2471fd965d291b1568738d18f55be60649f6fe7242e4c0bb9dbbf4f75e5081a48c5
-
Filesize
76KB
MD5a102ac0043981bff5ff2591dc80e5998
SHA1ffc73dd7d20ab53b1f2162a1208ebe3e56a2d86d
SHA2566abd6de95a8e98f2ae405b65133b0671d6ef298e05dbd6becdacf013e65c8932
SHA512eb778a6ceb038297187a9da4d6d7ef951f2ee27a00d0634e068259d7bd32312dbe9e89c338ec1fb9a1fc68e4840af2c0492e3be557dbde5540e6c7c65534a1b4
-
Filesize
676B
MD588e53182aae64bcf219a7bf5150e59e2
SHA11fa035a842b397c583eb465347016db31c54d9bb
SHA256bcca601632b203ad5b6f6f2b8845dabf6859d7371a5a81de0e9151c2611055ab
SHA5128fb6934eb38412e464568afb68271a14e67c4b61fb5fc14f8d49104773f2c6a88c2f1515e2b9dffd0ff9e2ad70ab34676d63bbbfe61b2839ca9bd03c8bc36adc
-
Filesize
208KB
MD524849219cb763fc6e33306ae0f115bd8
SHA17ab33d317cc68f1548eedd33df934c3f06dd1c6e
SHA2562237d922ccf8ac7397264f5013974b1025e2738423b780aeb8f6a318f9ccc459
SHA5125c2b857138fb15a6516aa9db1fd04c8c1db23d136c0317c1184d4240d25e752e40cd6f50e7d133dbc2781483b191c6795447683bf2333fb0f785774115c9ca80
-
Filesize
349B
MD5085df8c7ee382ce82afe30b19059ec3d
SHA13eb5a4204c0e248eebff12ca21d99eea5fbfbe73
SHA256c53ab87a493f146ef811c25f80f16e4c6f453dafb4e1c68c09b221686d5d90c3
SHA512d285b578c5812b38d5de36c8718be7bfe5638b429f84d62f817a2d92747f26ee4e97468facdf2e40f089e21c6c7bba159ff8fabaa617e09541bfcb02abfbdc28