Analysis
-
max time kernel
81s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
751eceda74a757f0200a674b46523b38.exe
Resource
win7-20231215-en
General
-
Target
751eceda74a757f0200a674b46523b38.exe
-
Size
771KB
-
MD5
751eceda74a757f0200a674b46523b38
-
SHA1
e7ba3c674080b16f4d6afd419ffe6720f74c8864
-
SHA256
2a23c37c542faaba1f61f2fa52eeef28ea91ab91ea97ea5f2875ec86a9b0f0d2
-
SHA512
f9b3e0ea691d3cb832a13ed2194f35510fa41f109b51bfcdacc33def857929fd4bcc979580dba0497ff9776d6643924dc0786478e5f9c5965e1ab3bc31d8f4f7
-
SSDEEP
24576:rpLS7SNYafVlZjFlb10hJaothZ2/T6FBBB:rAu/jp/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4588 751eceda74a757f0200a674b46523b38.exe -
Executes dropped EXE 1 IoCs
pid Process 4588 751eceda74a757f0200a674b46523b38.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2544 751eceda74a757f0200a674b46523b38.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2544 751eceda74a757f0200a674b46523b38.exe 4588 751eceda74a757f0200a674b46523b38.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2544 wrote to memory of 4588 2544 751eceda74a757f0200a674b46523b38.exe 87 PID 2544 wrote to memory of 4588 2544 751eceda74a757f0200a674b46523b38.exe 87 PID 2544 wrote to memory of 4588 2544 751eceda74a757f0200a674b46523b38.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\751eceda74a757f0200a674b46523b38.exe"C:\Users\Admin\AppData\Local\Temp\751eceda74a757f0200a674b46523b38.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\751eceda74a757f0200a674b46523b38.exeC:\Users\Admin\AppData\Local\Temp\751eceda74a757f0200a674b46523b38.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5b327be4ede35f2c4ba22a9f0e91e835f
SHA13101dc4ccaff7851b2c0d8ee59abf5483465ab5b
SHA256c6c71f195d1b5f44906ba2054f547c4ad9a9c46941d13a586b272d74b8f8a9da
SHA51260a89ae745f6135ea2ce5b98ad1b7f5814f2fafd3daf27c8f1025599079435c10cf1ca1d0e1decd1a777f8e600beffb7d0895bf1a959e4ba73a6beb1b7bf3a76