Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 04:36
Static task
static1
Behavioral task
behavioral1
Sample
8892bba0a849c3df57377fcfa4e2e896.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8892bba0a849c3df57377fcfa4e2e896.exe
Resource
win10v2004-20231215-en
General
-
Target
8892bba0a849c3df57377fcfa4e2e896.exe
-
Size
385KB
-
MD5
8892bba0a849c3df57377fcfa4e2e896
-
SHA1
a45c5b9a6854677d087dcb10dfb4832d240ffa48
-
SHA256
3b105d70136969d53890084070c7b685e2d528b75a34911531d6be4e07e8204a
-
SHA512
ba27a1c009c5a899b558f097c69a25b1cbaafde168b505ec44e73952efc8d3434c9bea0b4848cf12b6508e41037ac54b2c54cb861a8d547994b14785d9123563
-
SSDEEP
6144:/lPO7D1zItbLN7KVYVdAwI1FmnPaRkuFD8GU6O9REUgiyS92h8BFTdV9gzguupju:/cQ9lzAduniRku18H6s99f9V9g1upjUB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4176 8892bba0a849c3df57377fcfa4e2e896.exe -
Executes dropped EXE 1 IoCs
pid Process 4176 8892bba0a849c3df57377fcfa4e2e896.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 3 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4968 8892bba0a849c3df57377fcfa4e2e896.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4968 8892bba0a849c3df57377fcfa4e2e896.exe 4176 8892bba0a849c3df57377fcfa4e2e896.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4176 4968 8892bba0a849c3df57377fcfa4e2e896.exe 17 PID 4968 wrote to memory of 4176 4968 8892bba0a849c3df57377fcfa4e2e896.exe 17 PID 4968 wrote to memory of 4176 4968 8892bba0a849c3df57377fcfa4e2e896.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\8892bba0a849c3df57377fcfa4e2e896.exe"C:\Users\Admin\AppData\Local\Temp\8892bba0a849c3df57377fcfa4e2e896.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\8892bba0a849c3df57377fcfa4e2e896.exeC:\Users\Admin\AppData\Local\Temp\8892bba0a849c3df57377fcfa4e2e896.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD595275ee05c713a439b4ee646b86f1ea3
SHA162776c0eafe6726c6d210a751a171ef376e764b9
SHA2565413aeb0d97097d98fcb1494115d53fc7142889c96aa24bc0c28923ec88bf5d8
SHA512557469478865932c965ccbdb88f447bcca699558ccf184a993498eb3946e7479a45436e2cdf49d808a34ebb43ed40db834692bf2c6fe28283ab9491f0d5e488c