Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
8c8a2aff7a7d59e886f1670373dcb8b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c8a2aff7a7d59e886f1670373dcb8b7.exe
Resource
win10v2004-20231215-en
General
-
Target
8c8a2aff7a7d59e886f1670373dcb8b7.exe
-
Size
385KB
-
MD5
8c8a2aff7a7d59e886f1670373dcb8b7
-
SHA1
940045568512b8cbb5997fb338a18c2b0a8b003c
-
SHA256
562b89b879c49197748741f56550765e946f831a2b28b7f204e3494b778d5fa7
-
SHA512
fa9e84d6bf3a604ad3ce6e5d54edd4dcf622857881e4ea29f5c5d1f8eaf532230d15c8dad8c4ed4f3af33b0269e9d3c544851b52e1bd4f8f082228536423d1d1
-
SSDEEP
12288:mi6XDScKDzY1XcG/hquZdb/q1Vh//zZ+ZtM09hQ6iGPmmfIB4eXCqnFAXl4B:oWcEOX9/gw/yVhzmte6immdol4B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1552 8c8a2aff7a7d59e886f1670373dcb8b7.exe -
Executes dropped EXE 1 IoCs
pid Process 1552 8c8a2aff7a7d59e886f1670373dcb8b7.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3232 8c8a2aff7a7d59e886f1670373dcb8b7.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3232 8c8a2aff7a7d59e886f1670373dcb8b7.exe 1552 8c8a2aff7a7d59e886f1670373dcb8b7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3232 wrote to memory of 1552 3232 8c8a2aff7a7d59e886f1670373dcb8b7.exe 84 PID 3232 wrote to memory of 1552 3232 8c8a2aff7a7d59e886f1670373dcb8b7.exe 84 PID 3232 wrote to memory of 1552 3232 8c8a2aff7a7d59e886f1670373dcb8b7.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c8a2aff7a7d59e886f1670373dcb8b7.exe"C:\Users\Admin\AppData\Local\Temp\8c8a2aff7a7d59e886f1670373dcb8b7.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\8c8a2aff7a7d59e886f1670373dcb8b7.exeC:\Users\Admin\AppData\Local\Temp\8c8a2aff7a7d59e886f1670373dcb8b7.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD54ce8d4a9ac9119c2a1af7873a7b9bbf1
SHA1b39283bc54bd42e7178e4cd8bcfd918d69742e1d
SHA256613bb23051765ca49a424b73c06b41f54379f7ebf65427e33a616f2b1dc12d94
SHA51228b73c7f0dd2de3820da97791175fedafabac9b5fe86c9ac9cf74cb5e8b4f860ed67868692360c815ba6238232b7054785775587ce0425f7a7728c8cda90c987