Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
77d282c1878dd7fc7e9fbdc51323e953.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
77d282c1878dd7fc7e9fbdc51323e953.exe
Resource
win10v2004-20231222-en
General
-
Target
77d282c1878dd7fc7e9fbdc51323e953.exe
-
Size
907KB
-
MD5
77d282c1878dd7fc7e9fbdc51323e953
-
SHA1
8a460d4039a0dd7a608da07dbea90c0cdcb823b0
-
SHA256
d7a85bc48c751b2e10f593308de08c14cc3590387cfff808b4abbba2b5dfdcff
-
SHA512
94bc8122ecd0bd5895e8a87973475c4e0b0a4cc7f5d52de4876188bfe47a1a7f9111d8fbee25e284543fe9aafcc3196501503a9583cf639f8e2025377dc9e8d1
-
SSDEEP
24576:RaQ30kWoU00iJBbDJnNjh6c1M+6Oa/ZS1:pEkfHxJBbDdqOgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1060 77d282c1878dd7fc7e9fbdc51323e953.exe -
Executes dropped EXE 1 IoCs
pid Process 1060 77d282c1878dd7fc7e9fbdc51323e953.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1320 77d282c1878dd7fc7e9fbdc51323e953.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1320 77d282c1878dd7fc7e9fbdc51323e953.exe 1060 77d282c1878dd7fc7e9fbdc51323e953.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1060 1320 77d282c1878dd7fc7e9fbdc51323e953.exe 86 PID 1320 wrote to memory of 1060 1320 77d282c1878dd7fc7e9fbdc51323e953.exe 86 PID 1320 wrote to memory of 1060 1320 77d282c1878dd7fc7e9fbdc51323e953.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\77d282c1878dd7fc7e9fbdc51323e953.exe"C:\Users\Admin\AppData\Local\Temp\77d282c1878dd7fc7e9fbdc51323e953.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\77d282c1878dd7fc7e9fbdc51323e953.exeC:\Users\Admin\AppData\Local\Temp\77d282c1878dd7fc7e9fbdc51323e953.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1060
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5309768241a0e8af460d0e0b23483d39c
SHA1fdd710de36acc30e32147ddc571ab34220f8a5a7
SHA256f469bd32963521d7bd6a54825cce5c7a9fb0c5fbfdaecd7712835d145abb3aad
SHA512ebd8671ced0e971fcbe6f3340d984dbe69e29ccaad8203e9eb10ae3dce6684a038af33f840cdcc8236d383d613b46da46f710f81e90147c56e4adfc995b4c4a5