Analysis
-
max time kernel
95s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 01:08
Behavioral task
behavioral1
Sample
e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe
Resource
win10v2004-20241007-en
General
-
Target
e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe
-
Size
911KB
-
MD5
cf78e7c352ad00b31d9c7a6d001fd6f6
-
SHA1
4651bca09bcd2551b0e1c4c9f8cff20149e62d69
-
SHA256
e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0
-
SHA512
5ace1658abd46a7fbd2f0ebce1fee0c5f51abcac953afaf193e7e6d5d9b3a79aee7f1791912b0935832264f388a277d8199ef1953b30a688859b29e8fceb9b51
-
SSDEEP
24576:d+5T4MROxnFm5bHKTlQqrZlI0AilFEvxHipXoX:I50MiAqrZlI0AilFEvxHi
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe File opened for modification C:\Windows\assembly\Desktop.ini e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe File created C:\Windows\assembly\Desktop.ini e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe File opened for modification C:\Windows\assembly\Desktop.ini e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3240 wrote to memory of 3444 3240 e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe 82 PID 3240 wrote to memory of 3444 3240 e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe 82 PID 3444 wrote to memory of 1460 3444 csc.exe 84 PID 3444 wrote to memory of 1460 3444 csc.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe"C:\Users\Admin\AppData\Local\Temp\e204210f55662ee3a8c374cb24b2f824c19386cff7db54e47594d82e4038bbf0.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ulmqevtt.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA6D0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA6CF.tmp"3⤵PID:1460
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f759ba36294b9ae2592c967260879e84
SHA14f5d218fce0c917533ff56515ac877af0c491d32
SHA256eea8ccc5723a7f622f3b4b4936b36bfc232309cee5c2f3599bfba34fa2f26732
SHA512aaa7eec740b14faafb2ab09b65b0e3763d5fd744b8b64f42815b16ebeadc903586cee938f73452371759e3fa81719722bda3f95baab7ab3f6af897a3dfc073e7
-
Filesize
76KB
MD5d6e0556096365caf8f8073e6e03ab2ff
SHA10615a443eb39a1842b1ae1f389f09d92d59ce746
SHA256487075a01843c4bd6ba1bd05dc807a937183ab16e9a4a325d2d1860c0bd687e1
SHA512974e3cd0fa105c8932c150ccbbad14bd5bdec51e104cb2e8cee430901775f81539972b374a97ef418267e2d55303460cd4ead820098905712b46126b9e4aab89
-
Filesize
676B
MD56d185e59403982ee72fc7d859b95e1e8
SHA1052a69d86cb8daca06cea350e6577f1e506ff563
SHA25615e238ca6186eecf1d1b221274a78816087175662c971818f0427495b4651f67
SHA5120e45457eb0b827738dc07e308475fd495da98051db718ac1e66b80440294e2c49912fcc21c5bdae2fa6932146ebc63eea9870ed86d4b7aa5599047000ba79007
-
Filesize
208KB
MD5d220eaaf236717ba3cb5d5699c7da4e4
SHA1965f8c6ae27c48f23582a1b7e7e380a59cdab2a6
SHA2561a7e5ed264b810575406121e6a7fd917c4734d5a92b42e88c827c84f15ace98b
SHA51257758ebc7d4be6dc4eb898fca3d72f96aeef10e3b790007ef1c5a3c3efae03b628090eb9d7a7a3e932cd8b30b3d2c5329c5fd02f93926fb922e130c26d857b5c
-
Filesize
349B
MD51ff2a3cd9a978b5a543c247469d68175
SHA10073d5269cc18609dfe231417726929728965c1b
SHA2563ecc26d466caab51d14fd44cd6f213369cdb30b77e10720de892e8b3ce134a63
SHA5125bce04b12d9276dadf31474179dcae943442eedc93b1d6972d62acf66ecfd5b3152d80de7e69f33cfba3cfc81c2ccc606e3c7c25acd51c398488dcbb287e53ea