Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
8b1a2ef2b76d08c29302656a6376d742.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b1a2ef2b76d08c29302656a6376d742.exe
Resource
win10v2004-20231215-en
General
-
Target
8b1a2ef2b76d08c29302656a6376d742.exe
-
Size
771KB
-
MD5
8b1a2ef2b76d08c29302656a6376d742
-
SHA1
bea41846d23651ba1d554c47732199fd4ae2e2c4
-
SHA256
0d3a7744bb8258525d141c25376fd566b459a07e4415db302758c965105fad02
-
SHA512
16376e796d6d356dcf183d01faabca2264dd727b48a08671d08f30e3e47dd125ffa1561a424ab184d13a2474399d429f4659493996b650522594b46f2dfce1c7
-
SSDEEP
12288:S1inTsze1xByP44fS8Ac65PzJLniYZ/C9OFEIif0F6rerfrEhU8zFVMB:DTlYwWS8Ac2tvZWqEIz6qrfiTMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 960 8b1a2ef2b76d08c29302656a6376d742.exe -
Executes dropped EXE 1 IoCs
pid Process 960 8b1a2ef2b76d08c29302656a6376d742.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2352 8b1a2ef2b76d08c29302656a6376d742.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2352 8b1a2ef2b76d08c29302656a6376d742.exe 960 8b1a2ef2b76d08c29302656a6376d742.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 960 2352 8b1a2ef2b76d08c29302656a6376d742.exe 83 PID 2352 wrote to memory of 960 2352 8b1a2ef2b76d08c29302656a6376d742.exe 83 PID 2352 wrote to memory of 960 2352 8b1a2ef2b76d08c29302656a6376d742.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b1a2ef2b76d08c29302656a6376d742.exe"C:\Users\Admin\AppData\Local\Temp\8b1a2ef2b76d08c29302656a6376d742.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\8b1a2ef2b76d08c29302656a6376d742.exeC:\Users\Admin\AppData\Local\Temp\8b1a2ef2b76d08c29302656a6376d742.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5eba446cb3d4ae6b8330a0a7da1ad9694
SHA1191616b74efbf6f8b2917411d1bf881b7ea48fc5
SHA25630e1957861b8e2c95bde7ffd361759db0b08cf7f56718c45546123d285996da7
SHA5129e6be18384ab07eba9520ff4e8d4fb8e2be055871073ec60e4ad2e231a53ba6f94ba9ba51f32a09d89fb3367fad99261c2f9ca8afcc55622e5adc5c355cf076e