Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
78ab5949277dec26a14aba2b0c04809c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
78ab5949277dec26a14aba2b0c04809c.exe
Resource
win10v2004-20231215-en
General
-
Target
78ab5949277dec26a14aba2b0c04809c.exe
-
Size
907KB
-
MD5
78ab5949277dec26a14aba2b0c04809c
-
SHA1
61fa271bd67d691527cdd66887034ef8c453d3c7
-
SHA256
9b89ee95243573d2913bed0ab071a02470e90f4bed282d4f9c1ba6ec02ad2b97
-
SHA512
2b196a4ce51541aa68c22b5ef1830a3c830a3d94532f79705c86219dbe6e0474f774fe48bbb8fe8ffbaeba748a47870fafcd51ffaa4bc603ae56c9889ae9298e
-
SSDEEP
24576:bLY6TpCRLy04f0+Xwkev7qQrCbUAxYta/ZS1:YKsyX/y7qiCbvGtgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4948 78ab5949277dec26a14aba2b0c04809c.exe -
Executes dropped EXE 1 IoCs
pid Process 4948 78ab5949277dec26a14aba2b0c04809c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4288 78ab5949277dec26a14aba2b0c04809c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4288 78ab5949277dec26a14aba2b0c04809c.exe 4948 78ab5949277dec26a14aba2b0c04809c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4288 wrote to memory of 4948 4288 78ab5949277dec26a14aba2b0c04809c.exe 88 PID 4288 wrote to memory of 4948 4288 78ab5949277dec26a14aba2b0c04809c.exe 88 PID 4288 wrote to memory of 4948 4288 78ab5949277dec26a14aba2b0c04809c.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\78ab5949277dec26a14aba2b0c04809c.exe"C:\Users\Admin\AppData\Local\Temp\78ab5949277dec26a14aba2b0c04809c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\78ab5949277dec26a14aba2b0c04809c.exeC:\Users\Admin\AppData\Local\Temp\78ab5949277dec26a14aba2b0c04809c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD57e8fd5ac0fe4287e02cd78857f2224af
SHA1e3ad5384da4662460e8921697362c25167e9b2f9
SHA256c2a351a8b7a6026dee7dfbce6f9b2a5035239a95c8f80c598c6deeef4b85d774
SHA512e535adad088bc9bb486aafa616b7b2512137b084ffe2832724e8bda73ef388cea7fe4f224a666500fa5b1cde66bec9c3e8a802d8630e77133deeed7344b4001b