Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
981aa5ecb38b527086b5efdc2523f331.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
981aa5ecb38b527086b5efdc2523f331.exe
Resource
win10v2004-20231215-en
General
-
Target
981aa5ecb38b527086b5efdc2523f331.exe
-
Size
907KB
-
MD5
981aa5ecb38b527086b5efdc2523f331
-
SHA1
4931b4386b8ea7cb72696c54da6206bb04c14517
-
SHA256
89ac8746801651fc578015ea1ca38247feff0099af6a21f6a5923e705386acd4
-
SHA512
76a1c3b3166d53999469ca419e26acd481188e318d1a393a71249f4a4573656ca25d0611c330f329f52f55148954702a5363a028a903cc0eb61fe0af71de500d
-
SSDEEP
24576:MrP4zOdfDVvxW1vFrKkgUTKqolmnm7JL3a/ZS1:MrP4z2JE1vFrKMTqonOt3gS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2304 981aa5ecb38b527086b5efdc2523f331.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 981aa5ecb38b527086b5efdc2523f331.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1696 981aa5ecb38b527086b5efdc2523f331.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1696 981aa5ecb38b527086b5efdc2523f331.exe 2304 981aa5ecb38b527086b5efdc2523f331.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2304 1696 981aa5ecb38b527086b5efdc2523f331.exe 86 PID 1696 wrote to memory of 2304 1696 981aa5ecb38b527086b5efdc2523f331.exe 86 PID 1696 wrote to memory of 2304 1696 981aa5ecb38b527086b5efdc2523f331.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\981aa5ecb38b527086b5efdc2523f331.exe"C:\Users\Admin\AppData\Local\Temp\981aa5ecb38b527086b5efdc2523f331.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\981aa5ecb38b527086b5efdc2523f331.exeC:\Users\Admin\AppData\Local\Temp\981aa5ecb38b527086b5efdc2523f331.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD56b575732c3e0020e58800815d2317aae
SHA1bd143b6e007437f70b94b5af2837c6b5561c32e0
SHA256119a7a7da3a9e4a04baea399a192edad57173a3b94108858277262d51dc84c93
SHA512bb862f70d2b472f9138cb84ac190a23b944818eadeec99730b935b5f155ed858101715a28b35668e423a9a31f881b772d295758fb7bf348369c08ded327c15ae