Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
778982a571c11cda087314dffc99d045.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
778982a571c11cda087314dffc99d045.exe
Resource
win10v2004-20231215-en
General
-
Target
778982a571c11cda087314dffc99d045.exe
-
Size
907KB
-
MD5
778982a571c11cda087314dffc99d045
-
SHA1
f27f7d8848224c400f5b6164c70905b738eb489f
-
SHA256
72308efa56a7c9d7b00f8a3e9661ae1e1af7fd425641e0f7d776609958362beb
-
SHA512
8e6d4c1941f7f5b9f5e624598b445cbbb4bd52e5b953f9120ee4b2b219d9f79275a00c90c344f161606c350a85d2affca9d47bab37b14eae271c7c1f826233f1
-
SSDEEP
24576:v3czKz3+ixN1ZMEfv3OW4HEofkAQRk7nslMQgrswEkFpRNhV0O7sOed000X+90MM:1Q8ZGGOew6CNYywW6KBgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4876 778982a571c11cda087314dffc99d045.exe -
Executes dropped EXE 1 IoCs
pid Process 4876 778982a571c11cda087314dffc99d045.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4004 778982a571c11cda087314dffc99d045.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4004 778982a571c11cda087314dffc99d045.exe 4876 778982a571c11cda087314dffc99d045.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4876 4004 778982a571c11cda087314dffc99d045.exe 48 PID 4004 wrote to memory of 4876 4004 778982a571c11cda087314dffc99d045.exe 48 PID 4004 wrote to memory of 4876 4004 778982a571c11cda087314dffc99d045.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\778982a571c11cda087314dffc99d045.exe"C:\Users\Admin\AppData\Local\Temp\778982a571c11cda087314dffc99d045.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\778982a571c11cda087314dffc99d045.exeC:\Users\Admin\AppData\Local\Temp\778982a571c11cda087314dffc99d045.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD55a2dc576784b49a915a6311a9090cf7a
SHA1dbfb0d7c0f7b29d34a9fccda23e3ea20d7c78ff7
SHA2562d6d5cd298f5cbab8ce6e5a532b6314982f6c67c3de1a5068b3638ced46e6594
SHA512704fef9b4a26dff5773aa527511504f05629968ae82c08e875b571c10d48bc9b638c83e8e5fcfd5e5b8e8b1d1484fda6c18712f6dbb4549456e3d9850bd5e927