Analysis
-
max time kernel
89s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
8b8d346afabdb64f144ccee9d67c49dd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8b8d346afabdb64f144ccee9d67c49dd.exe
Resource
win10v2004-20231215-en
General
-
Target
8b8d346afabdb64f144ccee9d67c49dd.exe
-
Size
385KB
-
MD5
8b8d346afabdb64f144ccee9d67c49dd
-
SHA1
3083f56c499c9c523376bccd7908a0e702b6ead6
-
SHA256
6dae85febacbe70d20b6e966353d5eabda4ac257155554cdbf02bec6ee5468c4
-
SHA512
e04bbc4b28c7cb6c836f7364a70ae53d92529a5de81e59ae14362cd8ef2ba5edcad521c60503164d61e08301e962516c05497411ccde7f1110faa3dcd2e3b201
-
SSDEEP
6144:5inok8sNpilF9UziIvyUfAkMh2GRoTFY+8GDcphIVqAIrlQWFK3o0svRqZvN69PG:5iokHwlF93iDfDFHL8GwhwjILULB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3852 8b8d346afabdb64f144ccee9d67c49dd.exe -
Executes dropped EXE 1 IoCs
pid Process 3852 8b8d346afabdb64f144ccee9d67c49dd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2928 8b8d346afabdb64f144ccee9d67c49dd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2928 8b8d346afabdb64f144ccee9d67c49dd.exe 3852 8b8d346afabdb64f144ccee9d67c49dd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3852 2928 8b8d346afabdb64f144ccee9d67c49dd.exe 87 PID 2928 wrote to memory of 3852 2928 8b8d346afabdb64f144ccee9d67c49dd.exe 87 PID 2928 wrote to memory of 3852 2928 8b8d346afabdb64f144ccee9d67c49dd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b8d346afabdb64f144ccee9d67c49dd.exe"C:\Users\Admin\AppData\Local\Temp\8b8d346afabdb64f144ccee9d67c49dd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\8b8d346afabdb64f144ccee9d67c49dd.exeC:\Users\Admin\AppData\Local\Temp\8b8d346afabdb64f144ccee9d67c49dd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD598be0f94c0b760ff2185c6ab70593dc5
SHA1cadb5692931fe21e69d78abef8fff7c804556716
SHA256befb7c26d58fc724231213b6a684a5d0f3524d982d1095d8400d891ac38e1f66
SHA512140e080e7dea292141ddac59f3d140382a269afaa69c42dbd35b63c48d3c0cbde6b94f736ce58945c164f2d936aa4bc3e4fc451fd8eacf5613cea01d59c5b4fc