Analysis
-
max time kernel
154s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
992b150ee3d2bb8bbbb7d75d433342db.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
992b150ee3d2bb8bbbb7d75d433342db.exe
Resource
win10v2004-20231215-en
General
-
Target
992b150ee3d2bb8bbbb7d75d433342db.exe
-
Size
771KB
-
MD5
992b150ee3d2bb8bbbb7d75d433342db
-
SHA1
0ce667e48bed505225ace9d4e31b324633b77ffc
-
SHA256
4242673243627a83a218cd0f871442ee290e689cfac6452770a7065ce45313f5
-
SHA512
42ccf6185157f7af5eb47ff5d95acdbaf79aa7a2c8ff86ef20ec6b8c9449df7e1241cd6e30c65d550c6bca747f1da3c9ecf5dd4e4d83ec387cc57a9404ccf13d
-
SSDEEP
24576:MsqjuQ2IW7z6qbIb10hJaothZ2/T6FBBB:MsMuQzqbq/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4292 992b150ee3d2bb8bbbb7d75d433342db.exe -
Executes dropped EXE 1 IoCs
pid Process 4292 992b150ee3d2bb8bbbb7d75d433342db.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2296 992b150ee3d2bb8bbbb7d75d433342db.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2296 992b150ee3d2bb8bbbb7d75d433342db.exe 4292 992b150ee3d2bb8bbbb7d75d433342db.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2296 wrote to memory of 4292 2296 992b150ee3d2bb8bbbb7d75d433342db.exe 84 PID 2296 wrote to memory of 4292 2296 992b150ee3d2bb8bbbb7d75d433342db.exe 84 PID 2296 wrote to memory of 4292 2296 992b150ee3d2bb8bbbb7d75d433342db.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\992b150ee3d2bb8bbbb7d75d433342db.exe"C:\Users\Admin\AppData\Local\Temp\992b150ee3d2bb8bbbb7d75d433342db.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\992b150ee3d2bb8bbbb7d75d433342db.exeC:\Users\Admin\AppData\Local\Temp\992b150ee3d2bb8bbbb7d75d433342db.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD546df32f3df4d7a6a18f1ad6d7f4768b1
SHA1c91a11cfd2f2400c45a1724b78172c98d696753e
SHA25638710e0797089629ab3b69d08d0e3cf1c6f0d7d7e5f208bc0e7968de3233a384
SHA512e6189ba06c3ccedfdb7cf0ee50bdda1939c1982a0b5839a9de278107d5e63ccf945a8ee7017907534844ae200be6dee42d92da43e260f558849d07c6efd56159