Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2025 01:15
Behavioral task
behavioral1
Sample
8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe
Resource
win10v2004-20250129-en
General
-
Target
8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe
-
Size
903KB
-
MD5
3d2f2878ae8ae367ad30eded481a410b
-
SHA1
7915556d81977ea5c34fae39f94bf573be40a722
-
SHA256
8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51
-
SHA512
e67afb09fdefab6aa2ff496cec63db26f4288124f6abc41565c205266421d393db06fddc0d2b649176b03efbc177c7bb6ec4843dd25c6a46dcb9986f6203b2cb
-
SSDEEP
12288:W8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawflBa2Ley+trZNrI0AilFEvxHvB2:P3s4MROxnFCay6rZlI0AilFEvxHiL0U
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe File opened for modification C:\Windows\assembly\Desktop.ini 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe File created C:\Windows\assembly\Desktop.ini 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe File opened for modification C:\Windows\assembly\Desktop.ini 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4936 1400 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe 86 PID 1400 wrote to memory of 4936 1400 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe 86 PID 4936 wrote to memory of 4660 4936 csc.exe 88 PID 4936 wrote to memory of 4660 4936 csc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe"C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\via57unr.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES99DF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC99DE.tmp"3⤵PID:4660
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54b12294ac6db0ba18d20dc08621bff1b
SHA1e2c96c874d7071ea376936224a88a01a091e4562
SHA25631405a729df157fdcd6db02b6ca68a646f46d623908ee08313a54394c8a61a13
SHA512fefc06584b00c68d6f597e62bbae199756f252b778716e533ccb46bd00fc2a1125c54c81bbae6e60adcdecf27ae64ca0e50d2f57793961094fb8e5b856cc4057
-
Filesize
76KB
MD58b7940c50485448d55495194e9aff43f
SHA16d8355fdd78538873d15dddb6adc24ecd5bb7bc6
SHA2563d5b04cf576c24b0953d4e755071799ef1ec3fd4111a2c82c22a32f31bd19a27
SHA5127df94fae838eb3b735bfedd428efd1b3875a4343ad4f59a4dbe3a758274a5cebf165f330d247c079a14026d7f238f46e5eb20a8d0e1776fcd7dd265ebea1aa60
-
Filesize
676B
MD5f5590350febeb044a9ba647e594fd4e2
SHA14e1306295bb1fed7ac4dead330c91e3d7ea8472d
SHA256a68ad74e34e04d8718a0a13a35802fa8f6475b41b0dcf2987dee6cd8e27cd094
SHA51286524051ba0fc86d29d1f924ebd0cef190b4580537a838145ae4e33850051d129cc5db2e2a7337bd739092633306c3edb7dd053a4af43f68cd997e8e9a77494e
-
Filesize
208KB
MD5f470fb72b5d869f7f8506c8a0b158f1b
SHA1b651c9a69e8d2785554479ad47c237a44d7899aa
SHA2567777f3fc59a8fe6aeac29ee1a565687757acb148a47f2076d15120a7ed70b8fa
SHA512bb5c1c5dc261a9ef58789e65146f79b1ff2922c58c65e83e9704cc157d0be43e96d47c997626d95fc2d7ff6c3a02c77a2bdc9f01ad6c730b12f5ae3457f071ac
-
Filesize
349B
MD53c5af595bfd36e62b0c61bbe6031c492
SHA148d0a98a400b00535855d2e98c00a926999c5b14
SHA25635d6817d6beb5f62499597ba27d793a6c7a1dfb840d239b877a3f87d77ac124c
SHA5127522b7eb2ce9a9bfa222c45bf2e21a8f29123fb3a1344daea8a0a9ad8adb707bfda650716c68a796a1f344dce7a252425af09fabe92d09dceea4cb18afeb1f5b