Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 01:26
Behavioral task
behavioral1
Sample
78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe
Resource
win10v2004-20241007-en
General
-
Target
78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe
-
Size
903KB
-
MD5
e01f6c2e3489ec4f372f5e42043c76ad
-
SHA1
ff18a6f8f0535cb90bd1be41c5f751eb7e68c9bf
-
SHA256
78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97
-
SHA512
b7eb8aaf68bc5a91e94bb1889cda2d0c22af3cbf4011134b6b4d86d08ca6e945002f868a3c818fb0aa0e551193863167c874f4780aa93142b7e74768d96dd932
-
SSDEEP
12288:Y8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvBJ:p3s4MROxnF9LqrZlI0AilFEvxHi8b8o
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe File opened for modification C:\Windows\assembly\Desktop.ini 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe File created C:\Windows\assembly\Desktop.ini 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe File opened for modification C:\Windows\assembly\Desktop.ini 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 380 1928 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe 83 PID 1928 wrote to memory of 380 1928 78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe 83 PID 380 wrote to memory of 4816 380 csc.exe 85 PID 380 wrote to memory of 4816 380 csc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe"C:\Users\Admin\AppData\Local\Temp\78afefee16a6e648a08f0e348c086dde76f917e24b45dd4c64124fa0645f8d97.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mzoo3hi0.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9A3D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9A3C.tmp"3⤵PID:4816
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b3e415efadbcf1ad9945078de578638a
SHA1333bd87065354208e10cfdbc459672da81c6ae1c
SHA2568d3f0214f18ccfd1507ee662e5ae58c428b9f1e7e96906ecbfb73693690703dd
SHA512ddaae759900d7e2eab6b349944449fcd7b641151a57a12cb0f4f4bf77392f16d1ef862b7504ed3ea1ef27d99670cabbf799d131d4c04ab51139f0a1a6981d54c
-
Filesize
76KB
MD53fdcfdfbc32d59bbf4bd55a8c291a842
SHA1cb8e267c516af35fb80d8fc3bac0f49803f24eb9
SHA2560cec692542dacf56debd18d555e298d183d7ede714cbd7e983839e03f2f91a87
SHA51296488ceae1c10631ace6eaa2acca177a2b64cbff5eba5bece1641f3ef6d50b3a39f31fdb0b6af1c113aa876afe39775a2886d0b67d296659ab85d1fb47b27f63
-
Filesize
676B
MD5abf193f42f3c064383ef287edf4b8009
SHA19eb1828df289b52db97cbf16a10f7ff513f049cb
SHA25611e68fa8756bb9fa4d25b08681ac1b0afc247cd19b91dca05a8c227026509315
SHA5125cbe81cc5b8d42baf23bdd48bd567f682e74d7fb4871eb7bd13b0d26f430df753a316ab8786f632137bd7622594233f92aff48a1d771cf59b08defcf52aae24c
-
Filesize
208KB
MD5eff09a4d83955084eed3edb0703e849d
SHA1fc84ade52bc6b68f1cf7dacab7b9f3004fcd925e
SHA25668c04e882bcde98bdca10f4e29e1d2915c60e7a4ebaef596d9a6e8e6220f2144
SHA512b8d47fc3a5db45f2e2e31c9c60935baddb8e5cbed893e3d5e6eb03975f2d9134c09977940863b37bfbaf72313349e6a755bc736b852ac9c4d9c0117d4a86a99c
-
Filesize
349B
MD5e58ea2b741485f2bcb6ac2feda91a6d2
SHA1dd37d51f5b076f6edb38a086fb6170a86a3f69f5
SHA256b707ae0765a9eb395c55f5edfc91fdb7de3a143d79e44cc58b7ad35868fd8b21
SHA51223304f955e037e53c1f1667eaa84883f8d9f98b213352a7817ac49c54fe9e78b09d5c0a10503ee4080cc89f81d75230c46ff11b78a3a47bc6936cac457af5ecb