Analysis
-
max time kernel
88s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
8f864dda24fd970b32f10361166f9ef3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f864dda24fd970b32f10361166f9ef3.exe
Resource
win10v2004-20231222-en
General
-
Target
8f864dda24fd970b32f10361166f9ef3.exe
-
Size
385KB
-
MD5
8f864dda24fd970b32f10361166f9ef3
-
SHA1
e5c2351b9b84cb9c99539bba9afa54a97233dda4
-
SHA256
0ed5d763046dc5098dbcff120a7f7360ab67422c5b95419664d47ccab08b85a6
-
SHA512
e9c22db0a205d0cbbfaa155916a34890ec62b3f50467f58071d0874be0c0cff022f03666cc3aed04b198712cad80b2a99421590bcd8a3957d7f51f03f70e7157
-
SSDEEP
6144:IA4CXPEfKSfQLEojk5qWlVHYfwPmsIhF21um5nxdoTR48i7ZV+B:NQfKkQLEoI5qWlVHY2q5m9xdoT96CB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 320 8f864dda24fd970b32f10361166f9ef3.exe -
Executes dropped EXE 1 IoCs
pid Process 320 8f864dda24fd970b32f10361166f9ef3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2976 8f864dda24fd970b32f10361166f9ef3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2976 8f864dda24fd970b32f10361166f9ef3.exe 320 8f864dda24fd970b32f10361166f9ef3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2976 wrote to memory of 320 2976 8f864dda24fd970b32f10361166f9ef3.exe 16 PID 2976 wrote to memory of 320 2976 8f864dda24fd970b32f10361166f9ef3.exe 16 PID 2976 wrote to memory of 320 2976 8f864dda24fd970b32f10361166f9ef3.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f864dda24fd970b32f10361166f9ef3.exe"C:\Users\Admin\AppData\Local\Temp\8f864dda24fd970b32f10361166f9ef3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\8f864dda24fd970b32f10361166f9ef3.exeC:\Users\Admin\AppData\Local\Temp\8f864dda24fd970b32f10361166f9ef3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD55bd13e3b7028b20e43ffdd77866c04d9
SHA1f118a9c3f72a3f04274a714ff485ea72a034137c
SHA256558041d83b7a3fe2efe6159c04af34c21a7abf955c44d6d4b5bcaa813e85d4ff
SHA5129974206823844baf5efc8008da411fde719aa42cbf88bcc47e4664efb3c6d6b56073f8621408669e1ecb6f8bad871e76dd8807418957ff66fcf679b8a8a17c89