Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 21:51
Static task
static1
Behavioral task
behavioral1
Sample
759abc6d1147a8d1c9b14c812c6d738a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
759abc6d1147a8d1c9b14c812c6d738a.exe
Resource
win10v2004-20231222-en
General
-
Target
759abc6d1147a8d1c9b14c812c6d738a.exe
-
Size
907KB
-
MD5
759abc6d1147a8d1c9b14c812c6d738a
-
SHA1
6e4b23105792d5a1a027e9defa6d5eec7b93f0ae
-
SHA256
1de44809be1f954a6326078f877a6571112bdf60cbd4e7b53a62d223f2d64925
-
SHA512
a113f34f7752b255045a4eab10abb14834fe63dbf489e81eb82b2300c339177e6fe0e500b2f3bebf84f42bd671c8e8740b1f9693b6408b39698bfaaf6637136b
-
SSDEEP
24576:hQoXGHksyu3rn+XVsEIqAV1jXeje5a/ZS1:hPCkI+FsEzAbyjQgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2180 759abc6d1147a8d1c9b14c812c6d738a.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 759abc6d1147a8d1c9b14c812c6d738a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3556 759abc6d1147a8d1c9b14c812c6d738a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3556 759abc6d1147a8d1c9b14c812c6d738a.exe 2180 759abc6d1147a8d1c9b14c812c6d738a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3556 wrote to memory of 2180 3556 759abc6d1147a8d1c9b14c812c6d738a.exe 88 PID 3556 wrote to memory of 2180 3556 759abc6d1147a8d1c9b14c812c6d738a.exe 88 PID 3556 wrote to memory of 2180 3556 759abc6d1147a8d1c9b14c812c6d738a.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\759abc6d1147a8d1c9b14c812c6d738a.exe"C:\Users\Admin\AppData\Local\Temp\759abc6d1147a8d1c9b14c812c6d738a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\759abc6d1147a8d1c9b14c812c6d738a.exeC:\Users\Admin\AppData\Local\Temp\759abc6d1147a8d1c9b14c812c6d738a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5a87502ff17df51011ad67598981f5afe
SHA19cfb8a597a89ad5d27b4c4a235fac7f4edad6180
SHA256e69901eedf6666efaaa3d285503b4f1c79d0670bad3528d5cd8021c3059c6165
SHA5128012e290d256f000cc9baa3617c7bc9ea8450580ca942b288da634cc7fd5aafa015f2487233463bd51df4e2a8bfd8230083e3432c71b986ca241ed4ecfe2755d