Analysis
-
max time kernel
142s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
75186c253c2ef1ea55adc9f78c09c7b5.exe
Resource
win7-20231215-en
General
-
Target
75186c253c2ef1ea55adc9f78c09c7b5.exe
-
Size
385KB
-
MD5
75186c253c2ef1ea55adc9f78c09c7b5
-
SHA1
240cead2e4cd3f2c2f567f1708cc7ed78bbfa19a
-
SHA256
5a350e28faf4c3788dd68b51e80c7dd1aa187f3e71d4a2f83339d8027a11c53e
-
SHA512
72f466e20812d949ada06f3acce41cac77742b24417573053f6dcae92179594ed88c966355aa4a6d37b0bf2f68264c00be49b1102ba3c97c87623623eda86158
-
SSDEEP
6144:ATS0tiFuhllLbCulSoVDp/vKDDs4SqBfxSvFTbbiwGVZ2DCDWFVry9B:AMQhvLd7FKDbS+fx4THY21FV+9B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4660 75186c253c2ef1ea55adc9f78c09c7b5.exe -
Executes dropped EXE 1 IoCs
pid Process 4660 75186c253c2ef1ea55adc9f78c09c7b5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2268 75186c253c2ef1ea55adc9f78c09c7b5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2268 75186c253c2ef1ea55adc9f78c09c7b5.exe 4660 75186c253c2ef1ea55adc9f78c09c7b5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4660 2268 75186c253c2ef1ea55adc9f78c09c7b5.exe 25 PID 2268 wrote to memory of 4660 2268 75186c253c2ef1ea55adc9f78c09c7b5.exe 25 PID 2268 wrote to memory of 4660 2268 75186c253c2ef1ea55adc9f78c09c7b5.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\75186c253c2ef1ea55adc9f78c09c7b5.exe"C:\Users\Admin\AppData\Local\Temp\75186c253c2ef1ea55adc9f78c09c7b5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\75186c253c2ef1ea55adc9f78c09c7b5.exeC:\Users\Admin\AppData\Local\Temp\75186c253c2ef1ea55adc9f78c09c7b5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD524c59cf3303c40291a304fb9c0c378b9
SHA17a17d967e8f7863e67e72f6fda149ca5f6266b13
SHA25620e6f0a786044439e68e5861ca2735201e4004f1f291fb56e78addac8161397c
SHA512df81146c8a14da553a6502b526c3be9a8057413c6b6dc02bc31f4034d0c6acd7c2b6220d2b725631c06c66174b67ca9c4f48182865e92d51bd1e7ce6df9ef711