Analysis
-
max time kernel
87s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
8d165e44f372aac5ce5cd6b32c4b7837.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8d165e44f372aac5ce5cd6b32c4b7837.exe
Resource
win10v2004-20231222-en
General
-
Target
8d165e44f372aac5ce5cd6b32c4b7837.exe
-
Size
385KB
-
MD5
8d165e44f372aac5ce5cd6b32c4b7837
-
SHA1
5ddfffb4fba0fa6186c2a74692ab5fc57825e06d
-
SHA256
e4b9e68ab6a13fcdf94fb608d9c3f31b8537e2cd1019642eb1edad81f2810b10
-
SHA512
bfa78e925932afb353cc988fea617e61a78620a73a194a81cd21f4e627c8ff50a0d3ae0f103fd032ed54777992977bd17024e79f690d9079a301d60e49c37329
-
SSDEEP
6144:C2c4/usmMqowPQneM3ZUu/Hy3j2NkSFT0YAq2yTzhpgvBJ44k9B:CuWCq3PQeM3ZL5f0YhdzkJq9B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1192 8d165e44f372aac5ce5cd6b32c4b7837.exe -
Executes dropped EXE 1 IoCs
pid Process 1192 8d165e44f372aac5ce5cd6b32c4b7837.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 3 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4716 8d165e44f372aac5ce5cd6b32c4b7837.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4716 8d165e44f372aac5ce5cd6b32c4b7837.exe 1192 8d165e44f372aac5ce5cd6b32c4b7837.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4716 wrote to memory of 1192 4716 8d165e44f372aac5ce5cd6b32c4b7837.exe 84 PID 4716 wrote to memory of 1192 4716 8d165e44f372aac5ce5cd6b32c4b7837.exe 84 PID 4716 wrote to memory of 1192 4716 8d165e44f372aac5ce5cd6b32c4b7837.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d165e44f372aac5ce5cd6b32c4b7837.exe"C:\Users\Admin\AppData\Local\Temp\8d165e44f372aac5ce5cd6b32c4b7837.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\8d165e44f372aac5ce5cd6b32c4b7837.exeC:\Users\Admin\AppData\Local\Temp\8d165e44f372aac5ce5cd6b32c4b7837.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD52b068b514962c30d6de9f0c63711180d
SHA13b60e78bfaa2c0cf99f2a770d8b639b32b00121b
SHA2569c7d2b197cd9a92c36702b749318f28ad52677f7947806d3b1dd85d976bb67ce
SHA5125dcc40b6c8c3bfc38022580608bef0a687cda28eb91f73d1d9a4f940e570d516ffc1ce3f058f6c4f6602d5cbe7091d3f89134916c9b0bbb2b52243af0c23cca0