Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
7f6875d70fe1379047078e0b70ec7fb1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f6875d70fe1379047078e0b70ec7fb1.exe
Resource
win10v2004-20231222-en
General
-
Target
7f6875d70fe1379047078e0b70ec7fb1.exe
-
Size
771KB
-
MD5
7f6875d70fe1379047078e0b70ec7fb1
-
SHA1
9e66b4540b0fd3e5ad95a5aadc00d08b782848d3
-
SHA256
da2da1e5eba4d346e585196466a703f941c03d088f548390f81d0929fdb49033
-
SHA512
9cfdf3b1b04d0c72e21c009250808469504181dcac677985d68baeb7c447d02abcd8c264ce341cfa9559396edcf3f16275f8a738ad712fcf2e4d01d8b08e9758
-
SSDEEP
24576:Qh81jzQ0nb5z5K4/B1yHVb10hJaothZ2/T6FBBB:KGjzPbBL/BM5/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2240 7f6875d70fe1379047078e0b70ec7fb1.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 7f6875d70fe1379047078e0b70ec7fb1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4972 7f6875d70fe1379047078e0b70ec7fb1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4972 7f6875d70fe1379047078e0b70ec7fb1.exe 2240 7f6875d70fe1379047078e0b70ec7fb1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 2240 4972 7f6875d70fe1379047078e0b70ec7fb1.exe 37 PID 4972 wrote to memory of 2240 4972 7f6875d70fe1379047078e0b70ec7fb1.exe 37 PID 4972 wrote to memory of 2240 4972 7f6875d70fe1379047078e0b70ec7fb1.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f6875d70fe1379047078e0b70ec7fb1.exe"C:\Users\Admin\AppData\Local\Temp\7f6875d70fe1379047078e0b70ec7fb1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\7f6875d70fe1379047078e0b70ec7fb1.exeC:\Users\Admin\AppData\Local\Temp\7f6875d70fe1379047078e0b70ec7fb1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD53985157563c9216692e26c02f243fe86
SHA182ccb0744bf1472e4c08629443cd0af275a90b05
SHA256161fe1f85f193f7091362f6be81bc9a7cc1e625b4c3960defcb211661d487bcc
SHA512b33057872897f621ddcc216f6947d5c2c7cb98371dd79c08d2be61b904dd8115184238941508bdc07b0fc1b87297c87b44687cce10f964de9b435a2a30dce232