Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
8a99cbf977e780f8380309559fd7583f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a99cbf977e780f8380309559fd7583f.exe
Resource
win10v2004-20231215-en
General
-
Target
8a99cbf977e780f8380309559fd7583f.exe
-
Size
385KB
-
MD5
8a99cbf977e780f8380309559fd7583f
-
SHA1
bd58edb96d95751fe47946860eec358eed50f583
-
SHA256
b06dfcbdfb94150b0372e1ae2cb28c4f731d0bd748673862adb6f7a3511ded8b
-
SHA512
836b518705cd23b4137506d06ba4dd13dc3548f3a210e1e80e8dce3831b53cc7e0f8f43db0e9154e902b5371800fa0ddb26c428cbe1c12f41b03ab10f30ec43a
-
SSDEEP
6144:idI4rOWamWqyEdoR1cBXYwpJYLKeJDYwgll+yJ/F6owDrfMq82aJxiMmBoUAOR+r:SrOWNbFpJUtD7gbx/sVfM1JxXtORWLB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2580 8a99cbf977e780f8380309559fd7583f.exe -
Executes dropped EXE 1 IoCs
pid Process 2580 8a99cbf977e780f8380309559fd7583f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3216 8a99cbf977e780f8380309559fd7583f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3216 8a99cbf977e780f8380309559fd7583f.exe 2580 8a99cbf977e780f8380309559fd7583f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3216 wrote to memory of 2580 3216 8a99cbf977e780f8380309559fd7583f.exe 84 PID 3216 wrote to memory of 2580 3216 8a99cbf977e780f8380309559fd7583f.exe 84 PID 3216 wrote to memory of 2580 3216 8a99cbf977e780f8380309559fd7583f.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a99cbf977e780f8380309559fd7583f.exe"C:\Users\Admin\AppData\Local\Temp\8a99cbf977e780f8380309559fd7583f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\8a99cbf977e780f8380309559fd7583f.exeC:\Users\Admin\AppData\Local\Temp\8a99cbf977e780f8380309559fd7583f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD53923f74ed6202c7299ad28e1c5c84518
SHA190ad3c644a85195668b26ace28c74046721c3934
SHA2560391f3fcbae3356638bbcc2b1b51a5e00aa56024f6e7c990d1e3bbbf609f1a2b
SHA512aa33cc518bc300cfbbe868352a0581fa6a5c13df9d76c580d50ccb5de435efb624b4859c3f8a33d0d6ac4dfed26d0eff3b56317f6017dfb99466aa2c298a620a