Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
89d093ae3f86cce6324d0a678cdc22ca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
89d093ae3f86cce6324d0a678cdc22ca.exe
Resource
win10v2004-20231215-en
General
-
Target
89d093ae3f86cce6324d0a678cdc22ca.exe
-
Size
385KB
-
MD5
89d093ae3f86cce6324d0a678cdc22ca
-
SHA1
48e7debf07e29910139b8b0f1fb9f3321d76bf21
-
SHA256
c16490c90bd4c1faa1eb84b515003513f5066cf79d60f66fa59dbe01b0f927e0
-
SHA512
be0f9350b21f6abd5a14e9c3e07d9c712a643d1715fff5788e904f8b1709bf1ef8ce5050cd5f265fe1e29ada68e090954760c3a5eb695c4ef45e553b254f10c3
-
SSDEEP
12288:LHLcSYpEW8hEmOkZ1NhXuZt2ARUOMTfXB:LrcSv3EmOkHL/ARUOMT/B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2944 89d093ae3f86cce6324d0a678cdc22ca.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 89d093ae3f86cce6324d0a678cdc22ca.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1596 89d093ae3f86cce6324d0a678cdc22ca.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1596 89d093ae3f86cce6324d0a678cdc22ca.exe 2944 89d093ae3f86cce6324d0a678cdc22ca.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2944 1596 89d093ae3f86cce6324d0a678cdc22ca.exe 84 PID 1596 wrote to memory of 2944 1596 89d093ae3f86cce6324d0a678cdc22ca.exe 84 PID 1596 wrote to memory of 2944 1596 89d093ae3f86cce6324d0a678cdc22ca.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\89d093ae3f86cce6324d0a678cdc22ca.exe"C:\Users\Admin\AppData\Local\Temp\89d093ae3f86cce6324d0a678cdc22ca.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\89d093ae3f86cce6324d0a678cdc22ca.exeC:\Users\Admin\AppData\Local\Temp\89d093ae3f86cce6324d0a678cdc22ca.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD560eecd88b7d8f9a192b276fd28c47c72
SHA1f105bcf966e9437c142344bce050c6d66891fe17
SHA256edaedb1160d0105c0e6141c7bb0b930da6c1e55701103c511c8833bd67a5fae9
SHA51236e65f9e23cd8c4f285a46df2250f1a939e7b785014708a4ad585f31cc7f0391bed4b87e2589cd7cbc8674545917207d83fe3494e683300ddd19f32ae7b7c7bb