Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
756afa018ab060273c7e10a01b284b8e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
756afa018ab060273c7e10a01b284b8e.exe
Resource
win10v2004-20231222-en
General
-
Target
756afa018ab060273c7e10a01b284b8e.exe
-
Size
385KB
-
MD5
756afa018ab060273c7e10a01b284b8e
-
SHA1
9fe886d85e768d76688cf458f0d986e9c8c247f5
-
SHA256
18a94429afec71391fb29cd521be06be165f8efdf2e9ead15fa184758d682dca
-
SHA512
e5384063c0a3990d0fffdbb1b965fd5b35ffd55bcc657e912cc46601ab4d15f6547ba9c120e559b926c6ea9da6f12a7a0d839cb863ea8ca32222f88d9510339b
-
SSDEEP
6144:YAy2Yk3aPgkX28CGdzHyhHII0AzlDi6jWuUZQYAhB:Yx2FY3GwDytII0Az4IpSahB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2972 756afa018ab060273c7e10a01b284b8e.exe -
Executes dropped EXE 1 IoCs
pid Process 2972 756afa018ab060273c7e10a01b284b8e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3020 756afa018ab060273c7e10a01b284b8e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3020 756afa018ab060273c7e10a01b284b8e.exe 2972 756afa018ab060273c7e10a01b284b8e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2972 3020 756afa018ab060273c7e10a01b284b8e.exe 87 PID 3020 wrote to memory of 2972 3020 756afa018ab060273c7e10a01b284b8e.exe 87 PID 3020 wrote to memory of 2972 3020 756afa018ab060273c7e10a01b284b8e.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\756afa018ab060273c7e10a01b284b8e.exe"C:\Users\Admin\AppData\Local\Temp\756afa018ab060273c7e10a01b284b8e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\756afa018ab060273c7e10a01b284b8e.exeC:\Users\Admin\AppData\Local\Temp\756afa018ab060273c7e10a01b284b8e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269KB
MD588bf2e58dc404a4607875b9206d03aaf
SHA135ad0bec0ad71aa92387825060151887f7f40c78
SHA256bce24965e9ecd4a45c8ec573057e2d2e8eed1d4bb52464bfb09f0ac54402cb21
SHA51230e05c9d20d541259bfe2e2097ec1562252c810b4df1c18a926daaf209e7475ff07900c1442c90cf52d2fda1a439b5c8219e9d10e9141f030cfd375e5dd4588b