Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 01:07
Behavioral task
behavioral1
Sample
4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe
Resource
win10v2004-20241007-en
General
-
Target
4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe
-
Size
903KB
-
MD5
1015f1daea31f089ee84fd9b084b840c
-
SHA1
d6eff68dd33752762abf360902e87d8462b20d75
-
SHA256
4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e
-
SHA512
f73fe0a8a9481af5532ea3332a02f7a58bad411991af06b8fcbf4eb780baf1fd8ad8790a3abfe093eb8d7c23ad6d0b3c02ab423b162daf82354a2039a9346bb7
-
SSDEEP
12288:X8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawMRVcTqSA+9rZNrI0AilFEvxHvBs:s3s4MROxnF9LqrZlI0AilFEvxHiGo
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe File opened for modification C:\Windows\assembly\Desktop.ini 4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe File opened for modification C:\Windows\assembly\Desktop.ini 4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe File opened for modification C:\Windows\assembly 4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3544 wrote to memory of 2212 3544 4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe 83 PID 3544 wrote to memory of 2212 3544 4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe 83 PID 2212 wrote to memory of 408 2212 csc.exe 85 PID 2212 wrote to memory of 408 2212 csc.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe"C:\Users\Admin\AppData\Local\Temp\4507cd3211bb9010fe7f00f553d270d2cdbf9cfc2d9e179ac7ec914fb99e791e.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cicqfncx.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFB68.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCFB67.tmp"3⤵PID:408
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5dce1f346a5689edad78b9bacc51da97f
SHA18f186ca039fb6138cd4f638422db8f9fe59ca181
SHA2565947f0d4f09a30e8f15a8b4814a2b72549e4e348256e495c60da8212d7cbfe18
SHA512f9545b10a97e928e1d83242303827d0337222b5d0411985cc1c95d65ab2156e2b3dba7f4361c330b52516d80d2ea8970039c96caa802c1f48ec32cae7ac9fc58
-
Filesize
76KB
MD5fb9793bd8f7f39fa4c6547b3d68bbb48
SHA16587951cbeb9766911306a2f1b46b90f2ad28f70
SHA2568ad44447e6f60ba4fb34b587936d56608fce83e8b7951f9feff1488192df3f53
SHA5126d5d4dc6cf74e94c3f73bbee6a234704198a03232a3e20887ab20cfb4efd2b547f944b1e4df4f58f7720b9eed4a21636ea2a1a2633bc64a5d67d661e10e81492
-
Filesize
676B
MD519ea4a6c3c320f343a0307297b96f7fe
SHA12a0d07d0752a8aed2c1474cb5cbe49bf5900d1af
SHA25622a2124168ac20074f68b60a477a147fd61bc274a5bd479177ea9074642e7065
SHA5129bd660a9b9bbda30ad06018abce95f3f6977b734d8db87cccffaecaf1313e45d91f1620d1c5014486bc34a1a81157d8928f2aa9b1780e53635dd42b2bef25a76
-
Filesize
208KB
MD557f0d56fe55220433d23651cf2ba66e3
SHA1581a45ad54bb4c5bd50fad86a26824bc60b0e834
SHA256de983c110f8aaf7f7049514cd3dd908292d0b7f18ae274cdcecaa1e3db708ff5
SHA512d54196f3de01924b5d625ab5de8d6d8809211935461509b13043b618b746a99a45c9d0945dc0ca5d8b9250142f5dea9761224b1fa14bc79e83df8c5f8b85b01d
-
Filesize
349B
MD5237b0973176275801227e53857e168eb
SHA1053168a04eca46c7ed2d0fbede5fcde5ecf9a787
SHA256f4d8f31c5155185ba087780eed3fcf3a1b6b33a7b5f3da9010c5a2f88dfea821
SHA51263cef8c2ec7a1bcfba32b2c52101b62c131c57f7a2e63d9b1a5d406329cb2fec3db16198cc8346a69c2753e12adf3bedcb89a31c2cb2591cbcdf0dfdc039db52