Analysis
-
max time kernel
88s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
8f0128aca4f066df03655993b495fc52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f0128aca4f066df03655993b495fc52.exe
Resource
win10v2004-20231215-en
General
-
Target
8f0128aca4f066df03655993b495fc52.exe
-
Size
385KB
-
MD5
8f0128aca4f066df03655993b495fc52
-
SHA1
e251a7b3bcabf4c2e25618bddc2480ecf1280082
-
SHA256
e41b357e9b03c70fbff36575862b6d72db8b7e82ac9db501ce9e59b7a233b18b
-
SHA512
2e11c48e3b9e0aa7ea8292ad439e0b82a103242445c2c5fc1a2eeedbef68832fa849c5d96e64f8d17fe0e34cbfb5ec1b03cd35023598582a4b707fa1c11a20a5
-
SSDEEP
6144:z0FIkAgxzcO53YJuCybbwiOhjAhCsoaxXW/AQulMZyp/d/wRaofOqA69GG6YJB:zqIUIJebaKhx91hdlMG/52LLkCJB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3028 8f0128aca4f066df03655993b495fc52.exe -
Executes dropped EXE 1 IoCs
pid Process 3028 8f0128aca4f066df03655993b495fc52.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1560 8f0128aca4f066df03655993b495fc52.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1560 8f0128aca4f066df03655993b495fc52.exe 3028 8f0128aca4f066df03655993b495fc52.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3028 1560 8f0128aca4f066df03655993b495fc52.exe 84 PID 1560 wrote to memory of 3028 1560 8f0128aca4f066df03655993b495fc52.exe 84 PID 1560 wrote to memory of 3028 1560 8f0128aca4f066df03655993b495fc52.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f0128aca4f066df03655993b495fc52.exe"C:\Users\Admin\AppData\Local\Temp\8f0128aca4f066df03655993b495fc52.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\8f0128aca4f066df03655993b495fc52.exeC:\Users\Admin\AppData\Local\Temp\8f0128aca4f066df03655993b495fc52.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5b5c5a0d43ebe307792549ad0b83c9b30
SHA15be5153eed5bf2e8a9d72a4bb67181271e23498f
SHA25692ed7131b6426254feab3d66448ce82dcb9dc3ef63fafcc73607cbc8f53bf6a3
SHA5129237096623c3aea33901d50abbdccf5be0d032dae62cdd5b62e327cc9afd6124c27f180c6e51d08e6d3a02f7221df913eb4b8acec1a4608b5e23d88183add3eb