Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
754c5b0d3d601a36306bbd125261c235.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
754c5b0d3d601a36306bbd125261c235.exe
Resource
win10v2004-20231215-en
General
-
Target
754c5b0d3d601a36306bbd125261c235.exe
-
Size
907KB
-
MD5
754c5b0d3d601a36306bbd125261c235
-
SHA1
a020bb7974a2497827c7fc07df4905441609c731
-
SHA256
eb0639bda709c2907d16a82cd9159086da83da02511ac726ae225d75d3aef963
-
SHA512
b8fe3c8fc46fa33d65a750aba17913fe07e76bddec286cd9edf95cd9de6916b27a4f5c87028d435489c33dddf2afd9d34391fe2325ac17452835c8a4f67ef2ef
-
SSDEEP
24576:uZax6RkHsYeYS9Pkz1vhvuZTdMcfa/ZS1:lx/HsYex9Pkz1v4ZTdMYgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 216 754c5b0d3d601a36306bbd125261c235.exe -
Executes dropped EXE 1 IoCs
pid Process 216 754c5b0d3d601a36306bbd125261c235.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4376 754c5b0d3d601a36306bbd125261c235.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4376 754c5b0d3d601a36306bbd125261c235.exe 216 754c5b0d3d601a36306bbd125261c235.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 216 4376 754c5b0d3d601a36306bbd125261c235.exe 90 PID 4376 wrote to memory of 216 4376 754c5b0d3d601a36306bbd125261c235.exe 90 PID 4376 wrote to memory of 216 4376 754c5b0d3d601a36306bbd125261c235.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\754c5b0d3d601a36306bbd125261c235.exe"C:\Users\Admin\AppData\Local\Temp\754c5b0d3d601a36306bbd125261c235.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\754c5b0d3d601a36306bbd125261c235.exeC:\Users\Admin\AppData\Local\Temp\754c5b0d3d601a36306bbd125261c235.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5a1ba1de14e18de779524f1f8eb376da6
SHA1ae64367da230435017987797c028ea3a1ef53aa7
SHA2561e32b82ef691299751cff3b5a30ec46a8f4a4c2ae642c6a9b51b5cc57079022a
SHA51223ca7636c2c38ab588bc66d390b9fa7f55ab23ace1a2de78127d70769d87a90942aedcb01680ff81cfb6cc4cbb7369f49965183b7ce38bcfd178dcc8403c3147