Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2025 01:08

General

  • Target

    73c610ed5f12594f570c015b39f76d029a4b65b70716304a24124701a0430752.exe

  • Size

    912KB

  • MD5

    9cdb60fb52561caf7df59bab65909615

  • SHA1

    1e7ec967568cad334c5c0f627375d6b7e4b456da

  • SHA256

    73c610ed5f12594f570c015b39f76d029a4b65b70716304a24124701a0430752

  • SHA512

    8637778a8680408fd88d9395d9ad3313c4856a9534f1c8a0e7224f404334f29424f6a932bad61489d74575bf7cad4839cb40b9b57d5aaf0e5e78c9210faa3fff

  • SSDEEP

    12288:wUzyPotpL82hF457dG1lFlWcYT70pxnnaaoawVmr+4GSrZNrI0AilFEvxHvBM9/U:IcI4MROxnFZprZlI0AilFEvxHi9Dw

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73c610ed5f12594f570c015b39f76d029a4b65b70716304a24124701a0430752.exe
    "C:\Users\Admin\AppData\Local\Temp\73c610ed5f12594f570c015b39f76d029a4b65b70716304a24124701a0430752.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xv_0a2ds.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA6D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA6C.tmp"
        3⤵
          PID:2868

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESA6D.tmp

      Filesize

      1KB

      MD5

      b3b0a98064e07609df8e784ded8b7442

      SHA1

      37526e0db524d5b430980175d286e0cf3c695ad0

      SHA256

      6574250292f4b96dd2d11983313480655a1c116713a145b6377a9feaf9695447

      SHA512

      9381065019cc6ec95c57c2d49b86a2e23be2dce5dd5e4d73d2f4ab1e53ba1bc619d129623b5b9560845c10be99b8a51aab99d6eded4b63e2bd9387b78c7bf3f2

    • C:\Users\Admin\AppData\Local\Temp\xv_0a2ds.dll

      Filesize

      76KB

      MD5

      fc52c05b8d206b2a9583b90f8f1dbc10

      SHA1

      996d2ad7b34dd105ab8a4fdd3409ee51b3d61d56

      SHA256

      54d797f9207a14488fab4bc9960da4b43bf5bb7d7e3e188b3d8ffaf9ebda29e4

      SHA512

      e9e84079c151e7e029c57a59033d213a59b8a5f3d1978c2f0b4644d8dbca3bf6dc1c4ff774acea14242f9d237361933ccf3784c7b0c96c7db8f44feca9cd238d

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCA6C.tmp

      Filesize

      676B

      MD5

      bb5a17344256e8223d0b10aab222d219

      SHA1

      7c23a4331bd4bdb6a004d558b295ee7cdb00bf34

      SHA256

      102c8697c0f97d8c83b01f877ed1844ba826b00213d322b3bd1045794f7c7ffb

      SHA512

      143e9c5af8584b1043e31c4a3e5cfe5889ec716cb9323c832db1e65e1d3f9bb8fd658299f729eff27926532417e6e56a1d2e0ae3b6f51ffd583765f62d67dc45

    • \??\c:\Users\Admin\AppData\Local\Temp\xv_0a2ds.0.cs

      Filesize

      208KB

      MD5

      250321226bbc2a616d91e1c82cb4ab2b

      SHA1

      7cffd0b2e9c842865d8961386ab8fcfac8d04173

      SHA256

      ef2707f83a0c0927cfd46b115641b9cae52a41123e4826515b9eeb561785218d

      SHA512

      bda59ca04cdf254f837f2cec6da55eff5c3d2af00da66537b9ebaa3601c502ae63772f082fd12663b63d537d2e03efe87a3b5746ef25e842aaf1c7d88245b4e1

    • \??\c:\Users\Admin\AppData\Local\Temp\xv_0a2ds.cmdline

      Filesize

      349B

      MD5

      352267647252a08f7c6306aa52445938

      SHA1

      d5b24d4b9ecbd566cf7c12bbe0b1b2d45c83b9dc

      SHA256

      0141bb5ed62fd5c5c100bfa81558b7dd3f776b0dea28dc5bb25261c36f7ec3a2

      SHA512

      f3d3a10ea26532520578619168ec393030e75bf627e958d741f9c944466183e97d504a17e5302c1ed19c181f34aec70d0d24dad935520e9236ded95b29dd5cee

    • memory/2808-4-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-0-0x000007FEF620E000-0x000007FEF620F000-memory.dmp

      Filesize

      4KB

    • memory/2808-18-0x0000000000620000-0x0000000000636000-memory.dmp

      Filesize

      88KB

    • memory/2808-3-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-1-0x0000000000560000-0x00000000005BC000-memory.dmp

      Filesize

      368KB

    • memory/2808-2-0x0000000000280000-0x000000000028E000-memory.dmp

      Filesize

      56KB

    • memory/2808-20-0x00000000002A0000-0x00000000002B2000-memory.dmp

      Filesize

      72KB

    • memory/2808-21-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2808-22-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2968-16-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

      Filesize

      9.6MB

    • memory/2968-23-0x000007FEF5F50000-0x000007FEF68ED000-memory.dmp

      Filesize

      9.6MB