Analysis
-
max time kernel
81s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
7581d96017a25cb0982dfbfdb069947d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7581d96017a25cb0982dfbfdb069947d.exe
Resource
win10v2004-20231215-en
General
-
Target
7581d96017a25cb0982dfbfdb069947d.exe
-
Size
1.5MB
-
MD5
7581d96017a25cb0982dfbfdb069947d
-
SHA1
87828d9ccae071842dde80f11169f26218c9d924
-
SHA256
67bef1afa97a9c1f8724031d7593eb1523a32ddfb57de19902912b459d361ead
-
SHA512
86f7fb968e72e40396c91cc164f563123d05f3b3e6c7344f8173a0262c92e2f7ffb17cbe76d98ac459afbc2b70cdf18fea664485aa05c512728600288dcf8052
-
SSDEEP
24576:GSK6PyOEtwCP7ktb10hJaothZ2/T6FBBjNPI5lqkfZSkHR82b10hJaothZ2/T6FP:xPyVGCDkB/ofqg4/ofp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1748 7581d96017a25cb0982dfbfdb069947d.exe -
Executes dropped EXE 1 IoCs
pid Process 1748 7581d96017a25cb0982dfbfdb069947d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 10 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2348 7581d96017a25cb0982dfbfdb069947d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2348 7581d96017a25cb0982dfbfdb069947d.exe 1748 7581d96017a25cb0982dfbfdb069947d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 1748 2348 7581d96017a25cb0982dfbfdb069947d.exe 88 PID 2348 wrote to memory of 1748 2348 7581d96017a25cb0982dfbfdb069947d.exe 88 PID 2348 wrote to memory of 1748 2348 7581d96017a25cb0982dfbfdb069947d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\7581d96017a25cb0982dfbfdb069947d.exe"C:\Users\Admin\AppData\Local\Temp\7581d96017a25cb0982dfbfdb069947d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\7581d96017a25cb0982dfbfdb069947d.exeC:\Users\Admin\AppData\Local\Temp\7581d96017a25cb0982dfbfdb069947d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD52c7f8af44e5e8fc974ac1555c0f6bf85
SHA152e8939d813531d687aebfb45b3466df168c52b3
SHA256f0fe3bc4dc7c26b4b597ae594ffb3f3e5f97c2a58e05b7202af029bc69cb2011
SHA5127214b451d8c41bc995f44fb2bffa750a5427f46febe43721c38f6d099055f36b0b825e1d5dc708f9745920f92c2aa8a8c9799742e778d82692105f5f1f2a3bb8