Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
7a4e6770394198683b0aad7c11f616bb.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7a4e6770394198683b0aad7c11f616bb.exe
Resource
win10v2004-20231215-en
General
-
Target
7a4e6770394198683b0aad7c11f616bb.exe
-
Size
385KB
-
MD5
7a4e6770394198683b0aad7c11f616bb
-
SHA1
82fd8f08cf371c92da8719846b957b7aee861dfe
-
SHA256
e28f0b6ec14f2ccd426d58b60f39623a61e0fdb0c660b218156b388033c4b0d3
-
SHA512
bed67757daa036ad98ab79bd461294643fe59e1820baf55f759b5dd2aadf1ee1f16733c49b57bd26e26e08df446539bd15837b6b453425e16c71aaddc09cf895
-
SSDEEP
6144:B8VTyJsN0b9hzvpGX5ZaF19FttGvJjudX8BvphDmvm8vBKlGYivDIIB:2V0sNyvMZa6v5gcx3xDGB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4972 7a4e6770394198683b0aad7c11f616bb.exe -
Executes dropped EXE 1 IoCs
pid Process 4972 7a4e6770394198683b0aad7c11f616bb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5036 7a4e6770394198683b0aad7c11f616bb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5036 7a4e6770394198683b0aad7c11f616bb.exe 4972 7a4e6770394198683b0aad7c11f616bb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5036 wrote to memory of 4972 5036 7a4e6770394198683b0aad7c11f616bb.exe 86 PID 5036 wrote to memory of 4972 5036 7a4e6770394198683b0aad7c11f616bb.exe 86 PID 5036 wrote to memory of 4972 5036 7a4e6770394198683b0aad7c11f616bb.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a4e6770394198683b0aad7c11f616bb.exe"C:\Users\Admin\AppData\Local\Temp\7a4e6770394198683b0aad7c11f616bb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\7a4e6770394198683b0aad7c11f616bb.exeC:\Users\Admin\AppData\Local\Temp\7a4e6770394198683b0aad7c11f616bb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD54ba7993902b94263ff70adbf7a42e5a0
SHA19eca9fcdbefa3694e4b24b67a19094c3cf61ffb2
SHA256130d67bb5de0782b1d3e8bf2f875fc73048e5efe10e0850611882d9eba651b43
SHA51255adcc8c15e648bffd59e134e8fbadfc4394145bde97c66a6ae02deea660008e49464c50b90277369e7462c178de0faa409982a77f05813ab1735d0c136d6d95