Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 12:53
Static task
static1
Behavioral task
behavioral1
Sample
7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe
Resource
win10v2004-20231215-en
General
-
Target
7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe
-
Size
385KB
-
MD5
7d2e5c9eb1c1e6d65ccc0dc5dcba6769
-
SHA1
cfa3f4a576b033b634f35dbe7aa052a0e50830f3
-
SHA256
1ab12f17e3e2e39e2a2d1fe643edc29216bdf23c01d0f6c957c6f4f71c0be070
-
SHA512
68473dc46abf58435a4def4094b163a9b635c505c83b4d727c39c64c19a877d85b865b53523f687450c82da8dcc902dcbe8dfc987d4dd159c279044fd0f6e3a7
-
SSDEEP
12288:6fBPw0qeJ1zwTRKxzuD/ubQ61W+1ws354B:IBSIgzD4tGB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1620 7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe -
Executes dropped EXE 1 IoCs
pid Process 1620 7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2368 7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2368 7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe 1620 7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1620 2368 7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe 84 PID 2368 wrote to memory of 1620 2368 7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe 84 PID 2368 wrote to memory of 1620 2368 7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe"C:\Users\Admin\AppData\Local\Temp\7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exeC:\Users\Admin\AppData\Local\Temp\7d2e5c9eb1c1e6d65ccc0dc5dcba6769.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD56125670785657a334f57c9cf37c086ba
SHA135df84c541d8f3d929b5bf992c70aee62b1e3d3d
SHA256a93237de78dbe05ae892e794293001b5ce0f0ecd3777fc012c4eab09d9d5e8c8
SHA512dabba6055fa27710c20d53716e37d246e06f33c3b5b565164b42749006277ea21c4bcfe734f4123b157b11697801c631b27042f59b1d87b2c039e09a3913566c