Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2025 01:31

General

  • Target

    8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe

  • Size

    903KB

  • MD5

    3d2f2878ae8ae367ad30eded481a410b

  • SHA1

    7915556d81977ea5c34fae39f94bf573be40a722

  • SHA256

    8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51

  • SHA512

    e67afb09fdefab6aa2ff496cec63db26f4288124f6abc41565c205266421d393db06fddc0d2b649176b03efbc177c7bb6ec4843dd25c6a46dcb9986f6203b2cb

  • SSDEEP

    12288:W8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawflBa2Ley+trZNrI0AilFEvxHvB2:P3s4MROxnFCay6rZlI0AilFEvxHiL0U

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe
    "C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\_gccxb0_.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD0A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCACF9.tmp"
        3⤵
          PID:432

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESAD0A.tmp

      Filesize

      1KB

      MD5

      4cc3c5f37ee0361f305c18dd889c17b5

      SHA1

      505a34787e5f6230ffa889eedb9dffbd4c2fd60e

      SHA256

      7f52619f5b91114ca23a843978277797a7c9336cf2bed107891122a607845673

      SHA512

      1f6e5f0a2d8f8120fb2ad4f5141b7df7e6c297cd1965e6b5d1ef80213ac3268d484b2e4dad53a02bd8092ec9c2e43df0a6806e4e480ad3dbb3f5557af57fbd7b

    • C:\Users\Admin\AppData\Local\Temp\_gccxb0_.dll

      Filesize

      76KB

      MD5

      c620a2d65fc1af4c13e5c2b86af0bd0f

      SHA1

      dc590dab0f716ce4e329e60181c1871de11a0ca7

      SHA256

      66a41bc73c37f597d3159169813b4f167ca5b2a7325471066786b273d2767aa9

      SHA512

      af1d63ab95c02de5b40b2885bec6c0d34de608b210111ca6a52424dd0b312cf8ec042de9b7368abd2d6c74574090fb47c6a5dae7f9bd50d544c48a45e64eaaf8

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCACF9.tmp

      Filesize

      676B

      MD5

      a292dfebf52d14ebcbdfaadbd3b9bea6

      SHA1

      18183884c6f808dfeb085be720a02761b693721f

      SHA256

      ec983ec809f0991aabdedb110f52843fc3ef04f340769909b5df22049a9658a2

      SHA512

      3a0070285b27c6997c68091f92a71925f39c644a946ceda377a8e9b3bb09c7a407dec11e85184842500ced44da43dbb082af890f2422cc954a6a472fb6eb8141

    • \??\c:\Users\Admin\AppData\Local\Temp\_gccxb0_.0.cs

      Filesize

      208KB

      MD5

      92078f8508c8b67a7e24f2ec212820ca

      SHA1

      4751150f5a08cf116a0bc5afc67ad56d31aefd3f

      SHA256

      2075eb80f2b73cbea42d5af3c01052592ac3e1b0ea78f0d4e22fc4f7bf96a0a3

      SHA512

      a2bea02309880aa2170c59f23fda0905ac4c6617ec7a3bb23e7040f470ec23e445e9c4613c490be15116f4ababbb2a8fb67f73fe3ab9de276481f71cf2e4a3e7

    • \??\c:\Users\Admin\AppData\Local\Temp\_gccxb0_.cmdline

      Filesize

      349B

      MD5

      56159057eb5124bee7b0160d8703e3d9

      SHA1

      823f8ad42d6d5a3df8b5ab0020028cfea7947bf1

      SHA256

      2d5b2d414de8bbf45ab26bcd6cef6d68b72d98dca3665bb5bc983820f51b116b

      SHA512

      7f2310d160a2ac60c3345af1e0f468aa8cb07a19b45bc209e96c068db0aaefa5bbfe4c621f4970a6f997203e107785af037acae7c2bfe59e9b763b5ce02cbb67

    • memory/2248-21-0x00007FF970AA0000-0x00007FF971441000-memory.dmp

      Filesize

      9.6MB

    • memory/2248-18-0x00007FF970AA0000-0x00007FF971441000-memory.dmp

      Filesize

      9.6MB

    • memory/4476-7-0x000000001BC50000-0x000000001C11E000-memory.dmp

      Filesize

      4.8MB

    • memory/4476-1-0x00007FF970AA0000-0x00007FF971441000-memory.dmp

      Filesize

      9.6MB

    • memory/4476-0-0x00007FF970D55000-0x00007FF970D56000-memory.dmp

      Filesize

      4KB

    • memory/4476-6-0x000000001B700000-0x000000001B70E000-memory.dmp

      Filesize

      56KB

    • memory/4476-3-0x000000001B550000-0x000000001B5AC000-memory.dmp

      Filesize

      368KB

    • memory/4476-23-0x000000001B740000-0x000000001B756000-memory.dmp

      Filesize

      88KB

    • memory/4476-2-0x00007FF970AA0000-0x00007FF971441000-memory.dmp

      Filesize

      9.6MB

    • memory/4476-8-0x000000001C1C0000-0x000000001C25C000-memory.dmp

      Filesize

      624KB

    • memory/4476-25-0x0000000000D40000-0x0000000000D52000-memory.dmp

      Filesize

      72KB

    • memory/4476-26-0x0000000000D10000-0x0000000000D18000-memory.dmp

      Filesize

      32KB

    • memory/4476-27-0x00007FF970AA0000-0x00007FF971441000-memory.dmp

      Filesize

      9.6MB

    • memory/4476-28-0x00007FF970D55000-0x00007FF970D56000-memory.dmp

      Filesize

      4KB

    • memory/4476-29-0x00007FF970AA0000-0x00007FF971441000-memory.dmp

      Filesize

      9.6MB

    • memory/4476-31-0x00007FF970AA0000-0x00007FF971441000-memory.dmp

      Filesize

      9.6MB