Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
a31b9063310c539cd4985c1adaa5c035.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a31b9063310c539cd4985c1adaa5c035.exe
Resource
win10v2004-20240221-en
General
-
Target
a31b9063310c539cd4985c1adaa5c035.exe
-
Size
907KB
-
MD5
a31b9063310c539cd4985c1adaa5c035
-
SHA1
acb59d186e92ec65c0534531fdf1d25483d99954
-
SHA256
c8808ae5f067159854a2a10b42836c8948bfa7373e5017ceec7150918c46a2b6
-
SHA512
e3239ef68372e03308968e61f1d90ead46263a582d0c97ca81a38526d2b1112ec1cab63ba9b83a73cafb15b8df9cdca8b3401a6e26331eddd41c762123d38414
-
SSDEEP
12288:OQs5KwM61S0L3a3pGhldtdlrsV2/eHqBRNQ/Gaophv6lAMhEC6CCGjVDa/ZS1:ObhM6s0Owl37wkGKRQua/hEnCCEa/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3344 a31b9063310c539cd4985c1adaa5c035.exe -
Executes dropped EXE 1 IoCs
pid Process 3344 a31b9063310c539cd4985c1adaa5c035.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 13 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4448 a31b9063310c539cd4985c1adaa5c035.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4448 a31b9063310c539cd4985c1adaa5c035.exe 3344 a31b9063310c539cd4985c1adaa5c035.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3344 4448 a31b9063310c539cd4985c1adaa5c035.exe 87 PID 4448 wrote to memory of 3344 4448 a31b9063310c539cd4985c1adaa5c035.exe 87 PID 4448 wrote to memory of 3344 4448 a31b9063310c539cd4985c1adaa5c035.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a31b9063310c539cd4985c1adaa5c035.exe"C:\Users\Admin\AppData\Local\Temp\a31b9063310c539cd4985c1adaa5c035.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\a31b9063310c539cd4985c1adaa5c035.exeC:\Users\Admin\AppData\Local\Temp\a31b9063310c539cd4985c1adaa5c035.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD55a970d511adb6d11dc8e83b226be4060
SHA1071150d903199068fa0d4865dc73273178c0e0c1
SHA256b058308dde4b744d47d4cc94fd1a141f3963fc97486f40b34c81a6f634a7642f
SHA5126938122336a0eff1e97e0ecc7781a4dd9913b34948c6d48442960ac5d6e422d7dab5a8a57b95df9075d2bec9f5a13e8e2d18b7806bcb24c788a796fcf941f6cc