Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
7b9a469fdb396f55ab359ca27e9280cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7b9a469fdb396f55ab359ca27e9280cc.exe
Resource
win10v2004-20231215-en
General
-
Target
7b9a469fdb396f55ab359ca27e9280cc.exe
-
Size
385KB
-
MD5
7b9a469fdb396f55ab359ca27e9280cc
-
SHA1
96d2800df28f226991466ab8efa0a46511a66af5
-
SHA256
f041b7e94a03de3e11e2852089d19048869c0e5c09594ca04fe4788d60722ecc
-
SHA512
c57d2dac3ab0be15db3f42f195cb61333a4ed8add3e3966300bd5f69dad4978234970cfb6d2681e7115b5485b50adb15f9667b8138c97e91e262a709fa977291
-
SSDEEP
6144:vLYCn06Bcc2EYyH2gP84Qkdw8i05nmzwp1leyLbrHg/uS1lknjhB:DYAuA2VxkU05mmHH8u8IlB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1308 7b9a469fdb396f55ab359ca27e9280cc.exe -
Executes dropped EXE 1 IoCs
pid Process 1308 7b9a469fdb396f55ab359ca27e9280cc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3048 7b9a469fdb396f55ab359ca27e9280cc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3048 7b9a469fdb396f55ab359ca27e9280cc.exe 1308 7b9a469fdb396f55ab359ca27e9280cc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1308 3048 7b9a469fdb396f55ab359ca27e9280cc.exe 86 PID 3048 wrote to memory of 1308 3048 7b9a469fdb396f55ab359ca27e9280cc.exe 86 PID 3048 wrote to memory of 1308 3048 7b9a469fdb396f55ab359ca27e9280cc.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b9a469fdb396f55ab359ca27e9280cc.exe"C:\Users\Admin\AppData\Local\Temp\7b9a469fdb396f55ab359ca27e9280cc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\7b9a469fdb396f55ab359ca27e9280cc.exeC:\Users\Admin\AppData\Local\Temp\7b9a469fdb396f55ab359ca27e9280cc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5bdd2cf2a5dd0f084e71c98574587b14e
SHA17431350b8ce21ebe5565b7b74ab3fad2aa4e5f77
SHA256d6c8ed4976b26a804db1d893ed66d6224a9a247e94334dc49afb6e79d5cc2de0
SHA512301a30387e13004f6099ce504d185f3285da8ef7fc2a2d236c6dedf344f071994f7512eaa02e3f4053c008258e48a971eb306be0fb7d2b63911e9c7f598b2fa5