Analysis

  • max time kernel
    94s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2025 01:15

General

  • Target

    8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe

  • Size

    903KB

  • MD5

    3d2f2878ae8ae367ad30eded481a410b

  • SHA1

    7915556d81977ea5c34fae39f94bf573be40a722

  • SHA256

    8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51

  • SHA512

    e67afb09fdefab6aa2ff496cec63db26f4288124f6abc41565c205266421d393db06fddc0d2b649176b03efbc177c7bb6ec4843dd25c6a46dcb9986f6203b2cb

  • SSDEEP

    12288:W8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawflBa2Ley+trZNrI0AilFEvxHvB2:P3s4MROxnFCay6rZlI0AilFEvxHiL0U

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe
    "C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\via57unr.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES99DF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC99DE.tmp"
        3⤵
          PID:4660

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES99DF.tmp

      Filesize

      1KB

      MD5

      4b12294ac6db0ba18d20dc08621bff1b

      SHA1

      e2c96c874d7071ea376936224a88a01a091e4562

      SHA256

      31405a729df157fdcd6db02b6ca68a646f46d623908ee08313a54394c8a61a13

      SHA512

      fefc06584b00c68d6f597e62bbae199756f252b778716e533ccb46bd00fc2a1125c54c81bbae6e60adcdecf27ae64ca0e50d2f57793961094fb8e5b856cc4057

    • C:\Users\Admin\AppData\Local\Temp\via57unr.dll

      Filesize

      76KB

      MD5

      8b7940c50485448d55495194e9aff43f

      SHA1

      6d8355fdd78538873d15dddb6adc24ecd5bb7bc6

      SHA256

      3d5b04cf576c24b0953d4e755071799ef1ec3fd4111a2c82c22a32f31bd19a27

      SHA512

      7df94fae838eb3b735bfedd428efd1b3875a4343ad4f59a4dbe3a758274a5cebf165f330d247c079a14026d7f238f46e5eb20a8d0e1776fcd7dd265ebea1aa60

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC99DE.tmp

      Filesize

      676B

      MD5

      f5590350febeb044a9ba647e594fd4e2

      SHA1

      4e1306295bb1fed7ac4dead330c91e3d7ea8472d

      SHA256

      a68ad74e34e04d8718a0a13a35802fa8f6475b41b0dcf2987dee6cd8e27cd094

      SHA512

      86524051ba0fc86d29d1f924ebd0cef190b4580537a838145ae4e33850051d129cc5db2e2a7337bd739092633306c3edb7dd053a4af43f68cd997e8e9a77494e

    • \??\c:\Users\Admin\AppData\Local\Temp\via57unr.0.cs

      Filesize

      208KB

      MD5

      f470fb72b5d869f7f8506c8a0b158f1b

      SHA1

      b651c9a69e8d2785554479ad47c237a44d7899aa

      SHA256

      7777f3fc59a8fe6aeac29ee1a565687757acb148a47f2076d15120a7ed70b8fa

      SHA512

      bb5c1c5dc261a9ef58789e65146f79b1ff2922c58c65e83e9704cc157d0be43e96d47c997626d95fc2d7ff6c3a02c77a2bdc9f01ad6c730b12f5ae3457f071ac

    • \??\c:\Users\Admin\AppData\Local\Temp\via57unr.cmdline

      Filesize

      349B

      MD5

      3c5af595bfd36e62b0c61bbe6031c492

      SHA1

      48d0a98a400b00535855d2e98c00a926999c5b14

      SHA256

      35d6817d6beb5f62499597ba27d793a6c7a1dfb840d239b877a3f87d77ac124c

      SHA512

      7522b7eb2ce9a9bfa222c45bf2e21a8f29123fb3a1344daea8a0a9ad8adb707bfda650716c68a796a1f344dce7a252425af09fabe92d09dceea4cb18afeb1f5b

    • memory/1400-6-0x00007FFEBF870000-0x00007FFEC0211000-memory.dmp

      Filesize

      9.6MB

    • memory/1400-25-0x0000000000CC0000-0x0000000000CD2000-memory.dmp

      Filesize

      72KB

    • memory/1400-7-0x000000001B8B0000-0x000000001BD7E000-memory.dmp

      Filesize

      4.8MB

    • memory/1400-0-0x00007FFEBFB25000-0x00007FFEBFB26000-memory.dmp

      Filesize

      4KB

    • memory/1400-5-0x000000001B3D0000-0x000000001B3DE000-memory.dmp

      Filesize

      56KB

    • memory/1400-29-0x00007FFEBF870000-0x00007FFEC0211000-memory.dmp

      Filesize

      9.6MB

    • memory/1400-2-0x000000001B1E0000-0x000000001B23C000-memory.dmp

      Filesize

      368KB

    • memory/1400-27-0x00007FFEBF870000-0x00007FFEC0211000-memory.dmp

      Filesize

      9.6MB

    • memory/1400-23-0x000000001C4E0000-0x000000001C4F6000-memory.dmp

      Filesize

      88KB

    • memory/1400-1-0x00007FFEBF870000-0x00007FFEC0211000-memory.dmp

      Filesize

      9.6MB

    • memory/1400-8-0x000000001BE20000-0x000000001BEBC000-memory.dmp

      Filesize

      624KB

    • memory/1400-26-0x000000001B0B0000-0x000000001B0B8000-memory.dmp

      Filesize

      32KB

    • memory/4936-21-0x00007FFEBF870000-0x00007FFEC0211000-memory.dmp

      Filesize

      9.6MB

    • memory/4936-19-0x00007FFEBF870000-0x00007FFEC0211000-memory.dmp

      Filesize

      9.6MB