Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2025 01:31
Behavioral task
behavioral1
Sample
8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe
Resource
win10v2004-20250129-en
General
-
Target
8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe
-
Size
903KB
-
MD5
3d2f2878ae8ae367ad30eded481a410b
-
SHA1
7915556d81977ea5c34fae39f94bf573be40a722
-
SHA256
8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51
-
SHA512
e67afb09fdefab6aa2ff496cec63db26f4288124f6abc41565c205266421d393db06fddc0d2b649176b03efbc177c7bb6ec4843dd25c6a46dcb9986f6203b2cb
-
SSDEEP
12288:W8shHAVBuQBBed37dG1lFlWcYT70pxnnaaoawflBa2Ley+trZNrI0AilFEvxHvB2:P3s4MROxnFCay6rZlI0AilFEvxHiL0U
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe File opened for modification C:\Windows\assembly\Desktop.ini 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe File created C:\Windows\assembly\Desktop.ini 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe File opened for modification C:\Windows\assembly\Desktop.ini 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2248 4476 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe 86 PID 4476 wrote to memory of 2248 4476 8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe 86 PID 2248 wrote to memory of 432 2248 csc.exe 88 PID 2248 wrote to memory of 432 2248 csc.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe"C:\Users\Admin\AppData\Local\Temp\8ce030cbf4634646ae928f405ebef8c59df98db5d040e6829588f8f83f7cce51.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\_gccxb0_.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD0A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCACF9.tmp"3⤵PID:432
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54cc3c5f37ee0361f305c18dd889c17b5
SHA1505a34787e5f6230ffa889eedb9dffbd4c2fd60e
SHA2567f52619f5b91114ca23a843978277797a7c9336cf2bed107891122a607845673
SHA5121f6e5f0a2d8f8120fb2ad4f5141b7df7e6c297cd1965e6b5d1ef80213ac3268d484b2e4dad53a02bd8092ec9c2e43df0a6806e4e480ad3dbb3f5557af57fbd7b
-
Filesize
76KB
MD5c620a2d65fc1af4c13e5c2b86af0bd0f
SHA1dc590dab0f716ce4e329e60181c1871de11a0ca7
SHA25666a41bc73c37f597d3159169813b4f167ca5b2a7325471066786b273d2767aa9
SHA512af1d63ab95c02de5b40b2885bec6c0d34de608b210111ca6a52424dd0b312cf8ec042de9b7368abd2d6c74574090fb47c6a5dae7f9bd50d544c48a45e64eaaf8
-
Filesize
676B
MD5a292dfebf52d14ebcbdfaadbd3b9bea6
SHA118183884c6f808dfeb085be720a02761b693721f
SHA256ec983ec809f0991aabdedb110f52843fc3ef04f340769909b5df22049a9658a2
SHA5123a0070285b27c6997c68091f92a71925f39c644a946ceda377a8e9b3bb09c7a407dec11e85184842500ced44da43dbb082af890f2422cc954a6a472fb6eb8141
-
Filesize
208KB
MD592078f8508c8b67a7e24f2ec212820ca
SHA14751150f5a08cf116a0bc5afc67ad56d31aefd3f
SHA2562075eb80f2b73cbea42d5af3c01052592ac3e1b0ea78f0d4e22fc4f7bf96a0a3
SHA512a2bea02309880aa2170c59f23fda0905ac4c6617ec7a3bb23e7040f470ec23e445e9c4613c490be15116f4ababbb2a8fb67f73fe3ab9de276481f71cf2e4a3e7
-
Filesize
349B
MD556159057eb5124bee7b0160d8703e3d9
SHA1823f8ad42d6d5a3df8b5ab0020028cfea7947bf1
SHA2562d5b2d414de8bbf45ab26bcd6cef6d68b72d98dca3665bb5bc983820f51b116b
SHA5127f2310d160a2ac60c3345af1e0f468aa8cb07a19b45bc209e96c068db0aaefa5bbfe4c621f4970a6f997203e107785af037acae7c2bfe59e9b763b5ce02cbb67