Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
8058ab4c59eb57299ea38c943ddbe011.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8058ab4c59eb57299ea38c943ddbe011.exe
Resource
win10v2004-20231215-en
General
-
Target
8058ab4c59eb57299ea38c943ddbe011.exe
-
Size
385KB
-
MD5
8058ab4c59eb57299ea38c943ddbe011
-
SHA1
9b0def74b62ccd0a64e7f372f540635a276ba97b
-
SHA256
26c4faf4cfb5d0ed3c36201aa9f92248caba18e5074bdc5b577aee4889c7cb16
-
SHA512
595da773f3e4c3a71c6a258513407cdeb9f2f928a51105740587ef09f8a2f852a78926fedd406d5834c45207160341264231fa269ec95aab16bf982377b89bb6
-
SSDEEP
12288:0PO405xipKEfEkPRzGfUWv/DOKJdR1z38dGrefb12ojLbON24EB:0POzY0EfZhGsWv/DPDkB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3880 8058ab4c59eb57299ea38c943ddbe011.exe -
Executes dropped EXE 1 IoCs
pid Process 3880 8058ab4c59eb57299ea38c943ddbe011.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2632 8058ab4c59eb57299ea38c943ddbe011.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2632 8058ab4c59eb57299ea38c943ddbe011.exe 3880 8058ab4c59eb57299ea38c943ddbe011.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2632 wrote to memory of 3880 2632 8058ab4c59eb57299ea38c943ddbe011.exe 85 PID 2632 wrote to memory of 3880 2632 8058ab4c59eb57299ea38c943ddbe011.exe 85 PID 2632 wrote to memory of 3880 2632 8058ab4c59eb57299ea38c943ddbe011.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8058ab4c59eb57299ea38c943ddbe011.exe"C:\Users\Admin\AppData\Local\Temp\8058ab4c59eb57299ea38c943ddbe011.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\8058ab4c59eb57299ea38c943ddbe011.exeC:\Users\Admin\AppData\Local\Temp\8058ab4c59eb57299ea38c943ddbe011.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5c717103261a06ad84d914218d64e1c64
SHA1b9f75a000de7a997e96b4d14997e53fb1a866914
SHA256a4d061682ecec26fe2cf40e406a699b367e2e3f6a5cd37c2c7a40bda403902d8
SHA512a1757b005edb8454aa4a11cc4035d896db95a8367ee2936db2a52a486b34e5055024c6e8b453b2559be872aad86ae367304b760b029e57d5f559308f8254351b