Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
a18b7bd41d8b11e7dc751e7410d9e82d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a18b7bd41d8b11e7dc751e7410d9e82d.exe
Resource
win10v2004-20240221-en
General
-
Target
a18b7bd41d8b11e7dc751e7410d9e82d.exe
-
Size
385KB
-
MD5
a18b7bd41d8b11e7dc751e7410d9e82d
-
SHA1
e7b5702d4912ca4df279a144afa954e82b299e13
-
SHA256
2d0b040422ce0c0aea081e56d06a2f5016ab95bdb70cc43658aee432dcca757e
-
SHA512
6d2069df1ef2e38d32e62910d0392aa1c6fb63926e26306c7b8a14f22c1b32ea9a190fc2133d0f8b7a1022bbebe1fa66b31552a489a2019fb770e682c70ee290
-
SSDEEP
6144:xtoMAPa1lbdMhaDEuH11EmLLl9T4tWFQKd7MennNaW9FuCIF61CSS+CFWSk0B:xCMAPIxYaD9120590CQInuTAiB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1100 a18b7bd41d8b11e7dc751e7410d9e82d.exe -
Executes dropped EXE 1 IoCs
pid Process 1100 a18b7bd41d8b11e7dc751e7410d9e82d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3600 a18b7bd41d8b11e7dc751e7410d9e82d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3600 a18b7bd41d8b11e7dc751e7410d9e82d.exe 1100 a18b7bd41d8b11e7dc751e7410d9e82d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3600 wrote to memory of 1100 3600 a18b7bd41d8b11e7dc751e7410d9e82d.exe 88 PID 3600 wrote to memory of 1100 3600 a18b7bd41d8b11e7dc751e7410d9e82d.exe 88 PID 3600 wrote to memory of 1100 3600 a18b7bd41d8b11e7dc751e7410d9e82d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\a18b7bd41d8b11e7dc751e7410d9e82d.exe"C:\Users\Admin\AppData\Local\Temp\a18b7bd41d8b11e7dc751e7410d9e82d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\a18b7bd41d8b11e7dc751e7410d9e82d.exeC:\Users\Admin\AppData\Local\Temp\a18b7bd41d8b11e7dc751e7410d9e82d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD55e18990982748aecf545e922a47312d1
SHA1df8e388fd32606bfa107004d4cdaee52169d56d4
SHA25607c46e07239f441318396fc1b4f85d8b6091935709fcbe317628fe1f3d5df7b1
SHA512490d362eacb7a205fa60dbc3506acf7d11a22d89cff7b92619d6005474627711dfc8db8aac0b0952633673f982d7f6fc229bc126134ad11eb0673944fbcf7e69