Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
9933afcb808143a680d10030abb9527e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9933afcb808143a680d10030abb9527e.exe
Resource
win10v2004-20231215-en
General
-
Target
9933afcb808143a680d10030abb9527e.exe
-
Size
385KB
-
MD5
9933afcb808143a680d10030abb9527e
-
SHA1
84bb4fb6a32bc962424b3c0a48f3273c28df5175
-
SHA256
4d1ef6bb17e9254a158eda38072154a2caf950625d3dbe7b7287e1681125a0ab
-
SHA512
5fdf1da007845dc0e2c4c3573da903b8ccb59c0b767807417097f6d4e1801d5b564a7564e064062ec29228b6ab2d7e794dc13aceb4a723745b46183e58baecaf
-
SSDEEP
6144:oVqPmRb3BjnYmR8vOf3R6GlPbs2XhBZuEzfUGIYdDmQgsoszN8dvmOlMPsz83v5B:oVqPcb9nxR8s4szf/bgsosSdvmREIf5B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2040 9933afcb808143a680d10030abb9527e.exe -
Executes dropped EXE 1 IoCs
pid Process 2040 9933afcb808143a680d10030abb9527e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1208 9933afcb808143a680d10030abb9527e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1208 9933afcb808143a680d10030abb9527e.exe 2040 9933afcb808143a680d10030abb9527e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2040 1208 9933afcb808143a680d10030abb9527e.exe 84 PID 1208 wrote to memory of 2040 1208 9933afcb808143a680d10030abb9527e.exe 84 PID 1208 wrote to memory of 2040 1208 9933afcb808143a680d10030abb9527e.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9933afcb808143a680d10030abb9527e.exe"C:\Users\Admin\AppData\Local\Temp\9933afcb808143a680d10030abb9527e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\9933afcb808143a680d10030abb9527e.exeC:\Users\Admin\AppData\Local\Temp\9933afcb808143a680d10030abb9527e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5e501642cdd7f02f88aad17ec134de229
SHA10dc1b98702efe1ccb57f2982bf3ecf1d7bf4b96f
SHA256b2cd09ae932f5cc248e64b1ce3d45651f9a6f1ab7183878633d9b06eed693e9c
SHA5126a69a8a07544089c8939e7a3fe597ba374d24d4051a998f35418462d9c04ffefbe7563616a4d739602b4b8c41c836466f70d0948d10f288fdc1d988bd74088b4