Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
9975382adcfe6a4eadf82facf5cdf756.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9975382adcfe6a4eadf82facf5cdf756.exe
Resource
win10v2004-20231215-en
General
-
Target
9975382adcfe6a4eadf82facf5cdf756.exe
-
Size
907KB
-
MD5
9975382adcfe6a4eadf82facf5cdf756
-
SHA1
a279814fc2c601d042a359e2537a0c09072b36ea
-
SHA256
6d5c496d087573ccf5b8211aec5a88e70ec7981f473db9734e16c735040a5f11
-
SHA512
3875b02a21c620c7c272cfcf2e0bed81cc84b1cb31c653bcce2f9523a3261b9355e9310f063dfe01b2187b0e97d93c76dbfcbe978dcaad987b18fff973548181
-
SSDEEP
24576:DuPZ0Wy3HbJtQCBP6eSC07cfza8GCrCUCRpgt9+MxX51a/ZS1:VjFfzjmUCH0+UTgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1132 9975382adcfe6a4eadf82facf5cdf756.exe -
Executes dropped EXE 1 IoCs
pid Process 1132 9975382adcfe6a4eadf82facf5cdf756.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1664 9975382adcfe6a4eadf82facf5cdf756.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1664 9975382adcfe6a4eadf82facf5cdf756.exe 1132 9975382adcfe6a4eadf82facf5cdf756.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1132 1664 9975382adcfe6a4eadf82facf5cdf756.exe 85 PID 1664 wrote to memory of 1132 1664 9975382adcfe6a4eadf82facf5cdf756.exe 85 PID 1664 wrote to memory of 1132 1664 9975382adcfe6a4eadf82facf5cdf756.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9975382adcfe6a4eadf82facf5cdf756.exe"C:\Users\Admin\AppData\Local\Temp\9975382adcfe6a4eadf82facf5cdf756.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\9975382adcfe6a4eadf82facf5cdf756.exeC:\Users\Admin\AppData\Local\Temp\9975382adcfe6a4eadf82facf5cdf756.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD53a63777d636c44fdfbf83fb7042c4d03
SHA17674bc1e07b919662728a28398a81b5132e772c8
SHA25684e338ddf07314ba78b73d43ea48fdbdb93f07a22923adae0beb087e91b1f1e5
SHA51268c626a89593f34cf5cd47d96639e5ec47d71a926dcfa8d25995f7d3f30dc55d9ebfb075fe1f537742c7eb12debba7a02b7b2e2bf956deae88912baf9d27aa97