Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 01:29
Behavioral task
behavioral1
Sample
7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe
Resource
win10v2004-20241007-en
General
-
Target
7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe
-
Size
910KB
-
MD5
90e425380cdd0184c50f30c9f06af217
-
SHA1
2e2c7e0c80c7b05262822e1f1362d14c46eb5dc0
-
SHA256
7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d
-
SHA512
a1b1c6df4b5cdf7abb4a3fde6cc97a0bbce5cb06331eb02fa78e482181703a7bc3049ac8d520606ffe2aa9e045bb3633215d5f5e8a747fa035e1b4c116676365
-
SSDEEP
12288:85STYf+qnR7Fkxh7dG1lFlWcYT70pxnnaaoawASIh4BBpGmrZNrI0AilFEvxHvBI:ohg4MROxnFp/iHrZlI0AilFEvxHidj
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2172 7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2740 2172 7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe 30 PID 2172 wrote to memory of 2740 2172 7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe 30 PID 2172 wrote to memory of 2740 2172 7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe 30 PID 2740 wrote to memory of 2360 2740 csc.exe 32 PID 2740 wrote to memory of 2360 2740 csc.exe 32 PID 2740 wrote to memory of 2360 2740 csc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe"C:\Users\Admin\AppData\Local\Temp\7447b9a1359be0ab6ec6417b4e204baf435da07f12436f72cb4bff47a4ae743d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rz9xebk0.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5C64.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC5C63.tmp"3⤵PID:2360
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fcd5110d4e40f699f9440f1e987d6f13
SHA1ae6f81d2639cf8470d31cfe03908eb2128a2de5e
SHA2563fe2e9be89755fb9083835b8693be639c9d90e0ddb968ad846674da561e0de4b
SHA51244b907508cc2294f5dd5cbe793781c3e6e5c3a2a6e54e767e1a9065215236b37929aedda7652fd1bb285d56469368e22347461b64780dbdbb67a686b4ba703a0
-
Filesize
76KB
MD558725cd9b51849d7e54f43aaeebc1ed6
SHA1762487d310ef39283f046476fb790a63e3a51fff
SHA2561879d4323e42af123960a2c8fa54d3413fe9784c663a9e254db97734a0767d47
SHA512f560686e3019bc81c67970573bf4d75592e258e30cffbd2d2077556eef66fe6d8fe946cb65406665097a6690ec598b59a9fb724a030a889c33b82f89b2cfac6b
-
Filesize
676B
MD5c71cd9e1ada3ca668494128cf75b235f
SHA1858ee8c44104aefa3249084a45ffda8858dc6939
SHA25697a3d6c6ce376cecd967c03b89efeda0ecfe479429dd6b3ee68b0b692796b0b5
SHA51231f0fd7d953589255bdd9a131944bd0659f8dcb743648e29a1bb7518e20cac125c5269a5fa57f7b36676fd37afa1887489d34cb098da0d2abc89a604dc2834df
-
Filesize
208KB
MD56011503497b1b9250a05debf9690e52c
SHA1897aea61e9bffc82d7031f1b3da12fb83efc6d82
SHA25608f42b8d57bb61bc8f9628c8a80953b06ca4149d50108083fca6dc26bdd49434
SHA512604c33e82e8b5bb5c54389c2899c81e5482a06e69db08268173a5b4574327ee5de656d312011d07e50a2e398a4c9b0cd79029013f76e05e18cf67ce5a916ffd9
-
Filesize
349B
MD5dd9ef1fb0f914a7df41aa21ba43d2818
SHA10277d07bb02fd13b4e3d46cd98f02c34baea89dc
SHA256d167271c8fb1ff361bfc5f0cfb5e4f4ac290c3142eb74c568cdbbb2cee49c6d2
SHA512b73fd6afcaebd2dcc66f8837eaedb503fbe2eec982aa99beb832391f0f9cd2d78d7e41de5053ecf72d9dae278c2c841156e84773f8b9fe4e89425a915368cb58