Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 10:50
Static task
static1
Behavioral task
behavioral1
Sample
8952aab0fc171a3b2ffc45eb307a9376.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8952aab0fc171a3b2ffc45eb307a9376.exe
Resource
win10v2004-20231215-en
General
-
Target
8952aab0fc171a3b2ffc45eb307a9376.exe
-
Size
385KB
-
MD5
8952aab0fc171a3b2ffc45eb307a9376
-
SHA1
01f113b0da09000a948488804db029c2d03441d3
-
SHA256
dbbc995f62325b5b22e3a299c831fb04e2a9d503c513bbc00d98418c1e6a4f59
-
SHA512
d970c01c4b8ec3ea42aa2ee7e37f328f3112a89193d17edcc38e886897f961fcb1ef9f120be00d6fcfc7824675606c6c7600b1ef7973cdd3923d242aca2b0930
-
SSDEEP
6144:7oNQL+gB+Kp/oj3nED6VYEZvrfj+I9bZaWDDTelUYCgiWyLejiB:UQLVBF/ogWVYEJr79bZaAiaTWggiB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3196 8952aab0fc171a3b2ffc45eb307a9376.exe -
Executes dropped EXE 1 IoCs
pid Process 3196 8952aab0fc171a3b2ffc45eb307a9376.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3308 8952aab0fc171a3b2ffc45eb307a9376.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3308 8952aab0fc171a3b2ffc45eb307a9376.exe 3196 8952aab0fc171a3b2ffc45eb307a9376.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3308 wrote to memory of 3196 3308 8952aab0fc171a3b2ffc45eb307a9376.exe 84 PID 3308 wrote to memory of 3196 3308 8952aab0fc171a3b2ffc45eb307a9376.exe 84 PID 3308 wrote to memory of 3196 3308 8952aab0fc171a3b2ffc45eb307a9376.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8952aab0fc171a3b2ffc45eb307a9376.exe"C:\Users\Admin\AppData\Local\Temp\8952aab0fc171a3b2ffc45eb307a9376.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\8952aab0fc171a3b2ffc45eb307a9376.exeC:\Users\Admin\AppData\Local\Temp\8952aab0fc171a3b2ffc45eb307a9376.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD53b5fdf340e8a7426f11b28fdc68febc4
SHA1216c2ea16bce48ca98fbb4fa6adb6b27a7c5c30a
SHA256b788c04d6157afeee63dac8b525cbc8d4f31c9f31486fb0f46589eaf58986746
SHA51245533f679dc8dfd7326684c24eb8b210455124d62f75832677145a1e2a4b283cd80f30aa9b4b9e9becdcab6297a12cd7108ae025c79489287473a0a648194807