Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
7a4273fedfb60216899a6a3d35d0ca3d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a4273fedfb60216899a6a3d35d0ca3d.exe
Resource
win10v2004-20231215-en
General
-
Target
7a4273fedfb60216899a6a3d35d0ca3d.exe
-
Size
385KB
-
MD5
7a4273fedfb60216899a6a3d35d0ca3d
-
SHA1
1af11bc50b1af83fa021045fad7d90b55cfab25d
-
SHA256
fa285aac532ecc8b2fbe7dcfbb62832b8dff0211ce259ffadefa955c91193c62
-
SHA512
fb8cca9661e78880f902eedaf5bb5edb2c070ba53ba04f9bcb297ca72954ffff1b1a7f750ab7339ada414aba84e4efd3bdfdef2a0ea4c2b32782f1c738f75091
-
SSDEEP
6144:ekMezUq25LS9t8aD1t93m85PKzUplOOVS7JimSQWR/k7IuKNsiWhGn2PB:ePezUOt7DH9FPEKO1wM7IJGiKRB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2320 7a4273fedfb60216899a6a3d35d0ca3d.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 7a4273fedfb60216899a6a3d35d0ca3d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 980 7a4273fedfb60216899a6a3d35d0ca3d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 980 7a4273fedfb60216899a6a3d35d0ca3d.exe 2320 7a4273fedfb60216899a6a3d35d0ca3d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 980 wrote to memory of 2320 980 7a4273fedfb60216899a6a3d35d0ca3d.exe 86 PID 980 wrote to memory of 2320 980 7a4273fedfb60216899a6a3d35d0ca3d.exe 86 PID 980 wrote to memory of 2320 980 7a4273fedfb60216899a6a3d35d0ca3d.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a4273fedfb60216899a6a3d35d0ca3d.exe"C:\Users\Admin\AppData\Local\Temp\7a4273fedfb60216899a6a3d35d0ca3d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\7a4273fedfb60216899a6a3d35d0ca3d.exeC:\Users\Admin\AppData\Local\Temp\7a4273fedfb60216899a6a3d35d0ca3d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD52a7a3962708181081dba1facbff8f5ee
SHA19f2f0ac46c5a05ebbe31bc4d3ea982bb86c9f992
SHA25648a68a4fde3a76c27214bba1bf3ff7462a309795ff7cc9b9e617248eb29688a4
SHA5120906758fa65e9a74a839026c78c73212751123a06f243c34e218a35df1aed487d7a37bbde1eb8fe27185ff76cf7c967f4706f1856407c403061dfdd8fd711381