Analysis
-
max time kernel
89s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
7e5cb9a120a83d90a2eed895b2c76787.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e5cb9a120a83d90a2eed895b2c76787.exe
Resource
win10v2004-20231222-en
General
-
Target
7e5cb9a120a83d90a2eed895b2c76787.exe
-
Size
385KB
-
MD5
7e5cb9a120a83d90a2eed895b2c76787
-
SHA1
348413202fd5197bda78c662a79ff45f6057d593
-
SHA256
1945b2312cf9f3dd282dae950cdebe6cda599311d2eaaa0287eeaa62999ea8c8
-
SHA512
555b971dcd0e8389fb614c52465b8b370221fb34deae3bb51ea1a12fc691719c71ec34ce976e9d3a72037de9541e5b8a0ef3b0639d1559d8454f6170f16784eb
-
SSDEEP
12288:jP11iB8+AdAsQLa1G3xy1LLtYL/jOsI+31+CcA9VIFLjK0mUUE/Up9kJPYQG1r19:qaQ331stIO8KziB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3136 7e5cb9a120a83d90a2eed895b2c76787.exe -
Executes dropped EXE 1 IoCs
pid Process 3136 7e5cb9a120a83d90a2eed895b2c76787.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4968 7e5cb9a120a83d90a2eed895b2c76787.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4968 7e5cb9a120a83d90a2eed895b2c76787.exe 3136 7e5cb9a120a83d90a2eed895b2c76787.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4968 wrote to memory of 3136 4968 7e5cb9a120a83d90a2eed895b2c76787.exe 86 PID 4968 wrote to memory of 3136 4968 7e5cb9a120a83d90a2eed895b2c76787.exe 86 PID 4968 wrote to memory of 3136 4968 7e5cb9a120a83d90a2eed895b2c76787.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e5cb9a120a83d90a2eed895b2c76787.exe"C:\Users\Admin\AppData\Local\Temp\7e5cb9a120a83d90a2eed895b2c76787.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\7e5cb9a120a83d90a2eed895b2c76787.exeC:\Users\Admin\AppData\Local\Temp\7e5cb9a120a83d90a2eed895b2c76787.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5979d3e594aa82101edb5b6e33fefc1f1
SHA114d768044240f446c51a1ae5c10157c2d8087f3a
SHA2566711cd2d9d4c8b33ef8be083ddea5273aed176c4f4d1063589558b3ffa439c4b
SHA512f02ed8f1646d3b038ce574ad3bd4d2833a18fe923a7d61e867c9530c0a53c9bc624fcd79a23e4df1fec33e7dc623c291686776daf8b44cd4824a2443e89ee32a