Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
9a145b9bb9b86939ec09dc68131f7516.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a145b9bb9b86939ec09dc68131f7516.exe
Resource
win10v2004-20231215-en
General
-
Target
9a145b9bb9b86939ec09dc68131f7516.exe
-
Size
385KB
-
MD5
9a145b9bb9b86939ec09dc68131f7516
-
SHA1
af3e9a153281892ada9b23a4613c60f83a8a964b
-
SHA256
e7d293d5ba88e3e0e29c84b2341e4e7bb27ef77d3a9258cf1ae90c6bcff3f334
-
SHA512
78e59c6cb2deade6c15b237b072a0c18636149b4b1a0303336f17dc4f545e9d2968c7343f6a32999d1aaa0cc7bc656c0e5ac7c196342dc0b517bf9f298d18f5f
-
SSDEEP
12288:MJUGTNHnhY0M0LzIS6ckFnkOoVsD4LwpcB:MTZK0BzIdhkwD6B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3816 9a145b9bb9b86939ec09dc68131f7516.exe -
Executes dropped EXE 1 IoCs
pid Process 3816 9a145b9bb9b86939ec09dc68131f7516.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4380 9a145b9bb9b86939ec09dc68131f7516.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4380 9a145b9bb9b86939ec09dc68131f7516.exe 3816 9a145b9bb9b86939ec09dc68131f7516.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4380 wrote to memory of 3816 4380 9a145b9bb9b86939ec09dc68131f7516.exe 83 PID 4380 wrote to memory of 3816 4380 9a145b9bb9b86939ec09dc68131f7516.exe 83 PID 4380 wrote to memory of 3816 4380 9a145b9bb9b86939ec09dc68131f7516.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a145b9bb9b86939ec09dc68131f7516.exe"C:\Users\Admin\AppData\Local\Temp\9a145b9bb9b86939ec09dc68131f7516.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\9a145b9bb9b86939ec09dc68131f7516.exeC:\Users\Admin\AppData\Local\Temp\9a145b9bb9b86939ec09dc68131f7516.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5b455a2e3603c4a2e0c6e041394f26ca8
SHA1318c2e95434607ae4fe239c4de2ce31f1b09d822
SHA2567fdd064fc3976619c1ccdaa35840695c9bc31536f939d73d098209689e8a34f2
SHA51215a3a9e3de0852471620c3e44efdaecaf83a0fbd4e1df5cc83afa5075833229effd451988732936ce2571ee9718629d2a36d47dd3587de2b98d56aa1982188df