Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2025 01:31

General

  • Target

    8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe

  • Size

    903KB

  • MD5

    3d2f2878ae8ae367ad30eded481a410b

  • SHA1

    7915556d81977ea5c34fae39f94bf573be40a722

  • SHA256

    8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51

  • SHA512

    e67afb09fdefab6aa2ff496cec63db26f4288124f6abc41565c205266421d393db06fddc0d2b649176b03efbc177c7bb6ec4843dd25c6a46dcb9986f6203b2cb

  • SSDEEP

    12288:W8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawflBa2Ley+trZNrI0AilFEvxHvB2:P3s4MROxnFCay6rZlI0AilFEvxHiL0U

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe
    "C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\w9swebrj.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9D1B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC9D1A.tmp"
        3⤵
          PID:1908

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RES9D1B.tmp

      Filesize

      1KB

      MD5

      9734e4a63610ddd2f4b7f95c28bf4325

      SHA1

      1d2dde46c2bf52c07edcd91eb06cddf76df29a12

      SHA256

      d9724daedd4bc2180945343d44945c3b1969416f32a76c9a4abb20a9063e3c15

      SHA512

      b857bbc806aed9c93100de73d3aedfcc1291a241ae009e829e66a1de8a3712fc22f491d564bacf3afba0e7cde7a07413e73dbde5c8f76651f0d9e5ee818a65e4

    • C:\Users\Admin\AppData\Local\Temp\w9swebrj.dll

      Filesize

      76KB

      MD5

      588a21c9d8f067a01dcfbe290cdccba9

      SHA1

      428cc6c0b239dcfe984ca7f9525a2ff87e53e0d4

      SHA256

      2c24a9e2b11079ad9e25262ed169824e556087bf0e750c937179d92b43c6ec63

      SHA512

      cc6ebfd3f6a7f49b7702382b57fbd9d5924f2aedf5de31cf1321246fce26e350eb109857ce4a9c62ff116f1d939f62018b48a3cca0551e55a9c0e82485e16685

    • \??\c:\Users\Admin\AppData\Local\Temp\CSC9D1A.tmp

      Filesize

      676B

      MD5

      f3cabac3bd8088eb1b8c3610e4d5058b

      SHA1

      f5881f8d177bf40b3c0d92269cbf0876d96a8e19

      SHA256

      d55271de70f12183dd5f859545e9eeb60c12c882a57deabf818a95c60654775c

      SHA512

      6ce43c0a7fb8b785f84005bb20014756a54810bc0edd8ae7bef957d5f7b480698ba04388e4f7d0a14639a0a5ff43b27dccaad5131d94b8f02f9378e7b9cfea40

    • \??\c:\Users\Admin\AppData\Local\Temp\w9swebrj.0.cs

      Filesize

      208KB

      MD5

      c7ff23e93d6bac51c72ccc4b4734c4c9

      SHA1

      510772025f7f7ab20f1be7178e96949abca7f2da

      SHA256

      09ef87e06e41d2a9dcec812666b4c3254e31cc892b31373476f1fa0d3d3c535d

      SHA512

      b883c4ae46b74dee660a994741019acfe0513cffbfcb14656a7080933bf39df0ccbebd27329f941edd05f0f1bec22c5623db96907cf1ff6894e052b3fb833f69

    • \??\c:\Users\Admin\AppData\Local\Temp\w9swebrj.cmdline

      Filesize

      349B

      MD5

      e0c0c665892217051b9b59112c09726a

      SHA1

      7982be1c7d011eaeb8c3501a0ff9e8e5402a4137

      SHA256

      173322b61579cde44fd5f68c3933fa694a63a4c23072200f92bd03a1ba6d52fe

      SHA512

      46a51e3d239ef9416a1489b25c9686d24da19ac48fcb9252976e02f40ed1ea508ab8fc1a53222b6fa36946481209fa3e8f87bf8060b1ec6ae47f95018be94271

    • memory/1780-17-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

      Filesize

      9.6MB

    • memory/1780-10-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

      Filesize

      9.6MB

    • memory/2432-9-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

      Filesize

      9.6MB

    • memory/2432-6-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

      Filesize

      9.6MB

    • memory/2432-0-0x000007FEF5C7E000-0x000007FEF5C7F000-memory.dmp

      Filesize

      4KB

    • memory/2432-1-0x000000001AE20000-0x000000001AE7C000-memory.dmp

      Filesize

      368KB

    • memory/2432-2-0x0000000000680000-0x000000000068E000-memory.dmp

      Filesize

      56KB

    • memory/2432-19-0x000000001AEA0000-0x000000001AEB6000-memory.dmp

      Filesize

      88KB

    • memory/2432-21-0x0000000000740000-0x0000000000752000-memory.dmp

      Filesize

      72KB

    • memory/2432-22-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

      Filesize

      9.6MB

    • memory/2432-23-0x000007FEF59C0000-0x000007FEF635D000-memory.dmp

      Filesize

      9.6MB