Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
8e67174689e4d67462f504590736aa6d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e67174689e4d67462f504590736aa6d.exe
Resource
win10v2004-20231215-en
General
-
Target
8e67174689e4d67462f504590736aa6d.exe
-
Size
385KB
-
MD5
8e67174689e4d67462f504590736aa6d
-
SHA1
d5fc47ebe6043ebd7a491c7a876881e23d0867b2
-
SHA256
f5e6762c52dcdfe3b082587905dc50b42a313cdb7afb5873ad3650a58a387053
-
SHA512
ad2c915cb25aafcaa367c1e9b3dcda92b1031d0e5a3d9b9e27c5b226e3fdd35066f4d4f32ab781fe420cdf741f4b7ec676e7a56ec992afbb53e476b3a568a229
-
SSDEEP
12288:2VwSdJ2FeZ64QyeOmPShuIYYCysFGdDu/lP2B:2VwSr2FewyePa8KCyCGdDCQB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5072 8e67174689e4d67462f504590736aa6d.exe -
Executes dropped EXE 1 IoCs
pid Process 5072 8e67174689e4d67462f504590736aa6d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4000 8e67174689e4d67462f504590736aa6d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4000 8e67174689e4d67462f504590736aa6d.exe 5072 8e67174689e4d67462f504590736aa6d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 5072 4000 8e67174689e4d67462f504590736aa6d.exe 84 PID 4000 wrote to memory of 5072 4000 8e67174689e4d67462f504590736aa6d.exe 84 PID 4000 wrote to memory of 5072 4000 8e67174689e4d67462f504590736aa6d.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e67174689e4d67462f504590736aa6d.exe"C:\Users\Admin\AppData\Local\Temp\8e67174689e4d67462f504590736aa6d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\8e67174689e4d67462f504590736aa6d.exeC:\Users\Admin\AppData\Local\Temp\8e67174689e4d67462f504590736aa6d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD51f52039e1a232d57e34552b248d2f51b
SHA1e806c7cdc2b7c99438929258620d960b074fdfa8
SHA256dceab416866d2901d7c5d22e232f59ae82ccec9187cfc1f85d2b854b867dfa52
SHA5122f846b9c1d3187c52db574d74ff882750ffeb909859d34c683b229958cd323b4afa4f6495ed10de845be7e6ceaeaa16c10989fb94796f1eb0c333741f4d06724