Analysis
-
max time kernel
142s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
a38cdaab062f1561f554f9ff2f14fb98.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a38cdaab062f1561f554f9ff2f14fb98.exe
Resource
win10v2004-20240221-en
General
-
Target
a38cdaab062f1561f554f9ff2f14fb98.exe
-
Size
385KB
-
MD5
a38cdaab062f1561f554f9ff2f14fb98
-
SHA1
f918478ca0ff8d79d6b0e941952ab5d1ee22c84b
-
SHA256
c481fc82906f87de6b82ae08990ad1a62aa7bb616b6ead1667e33d1b69fbacfa
-
SHA512
797c103ed40dace91fd7803131cba2650a8248833f7d8e6a7fe3b46c346f393bc20343c389d0cfc5678bb389d03d15bc4f9734fc9ba1b41c727d464a87fd99ec
-
SSDEEP
12288:vuj0wOFeoh542n7x1JC39Rxc5y/W4yyGMrT1Mm6rgB:sOFeoTl1QBc5EWpsrTqm6rgB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1052 a38cdaab062f1561f554f9ff2f14fb98.exe -
Executes dropped EXE 1 IoCs
pid Process 1052 a38cdaab062f1561f554f9ff2f14fb98.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 11 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3300 a38cdaab062f1561f554f9ff2f14fb98.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3300 a38cdaab062f1561f554f9ff2f14fb98.exe 1052 a38cdaab062f1561f554f9ff2f14fb98.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3300 wrote to memory of 1052 3300 a38cdaab062f1561f554f9ff2f14fb98.exe 86 PID 3300 wrote to memory of 1052 3300 a38cdaab062f1561f554f9ff2f14fb98.exe 86 PID 3300 wrote to memory of 1052 3300 a38cdaab062f1561f554f9ff2f14fb98.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38cdaab062f1561f554f9ff2f14fb98.exe"C:\Users\Admin\AppData\Local\Temp\a38cdaab062f1561f554f9ff2f14fb98.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\a38cdaab062f1561f554f9ff2f14fb98.exeC:\Users\Admin\AppData\Local\Temp\a38cdaab062f1561f554f9ff2f14fb98.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD573c51da96164fa166a2f1c92536d0dec
SHA13abede5f1f9d2e7a82627431b18d27b8fe761aed
SHA25613b14d661fd24aae49daebddf3093b0dc5eed05a4e505167f3a51988a019078a
SHA5120897dea3a1578c96ce80dcec1b8596961d89686ec987cdf871c65347d9aa2310a87cd575c95c18605dd6452f31584f5532fda613588247fedf6764899a7c53be