Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 10:53 UTC

General

  • Target

    a397b30b1023379e88a570dddc023ddd.exe

  • Size

    385KB

  • MD5

    a397b30b1023379e88a570dddc023ddd

  • SHA1

    548e456361fc1e37e6f86b298070cf575bbddb68

  • SHA256

    406c7211ff817191aeb3368c838fb4de7879f2b2aaf1df5af531ce86ef0f5cdd

  • SHA512

    025cd3e5f275434f5ca610ac231d8b52ab9cd1b0dfd8b2ff192cad326b7c52827b246f1b9f95f4dc22be12103c699abbdf889d173df4e1b0bde71f45d2a25c71

  • SSDEEP

    6144:qIwBb1SMIUpj4FK9jel5dFTlB0ATfZt8CK7oClsRyUxfsVmB:7g4MyFUCTd3B5837oCSysXB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a397b30b1023379e88a570dddc023ddd.exe
    "C:\Users\Admin\AppData\Local\Temp\a397b30b1023379e88a570dddc023ddd.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Users\Admin\AppData\Local\Temp\a397b30b1023379e88a570dddc023ddd.exe
      C:\Users\Admin\AppData\Local\Temp\a397b30b1023379e88a570dddc023ddd.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1836

Network

  • flag-us
    DNS
    0.204.248.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.204.248.87.in-addr.arpa
    IN PTR
    Response
    0.204.248.87.in-addr.arpa
    IN PTR
    https-87-248-204-0lhrllnwnet
  • flag-us
    DNS
    22.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    9.228.82.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    9.228.82.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    pastebin.com
    a397b30b1023379e88a570dddc023ddd.exe
    Remote address:
    8.8.8.8:53
    Request
    pastebin.com
    IN A
    Response
    pastebin.com
    IN A
    104.20.67.143
    pastebin.com
    IN A
    104.20.68.143
    pastebin.com
    IN A
    172.67.34.170
  • flag-us
    GET
    https://pastebin.com/raw/ubFNTPjt
    a397b30b1023379e88a570dddc023ddd.exe
    Remote address:
    104.20.67.143:443
    Request
    GET /raw/ubFNTPjt HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: pastebin.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Sun, 25 Feb 2024 10:53:39 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    x-frame-options: DENY
    x-frame-options: DENY
    x-content-type-options: nosniff
    x-content-type-options: nosniff
    x-xss-protection: 1;mode=block
    x-xss-protection: 1;mode=block
    cache-control: public, max-age=1801
    CF-Cache-Status: HIT
    Age: 1209
    Server: cloudflare
    CF-RAY: 85af67e14ddb48cd-LHR
  • flag-us
    DNS
    143.67.20.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    143.67.20.104.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    57.169.31.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    57.169.31.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    41.110.16.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    41.110.16.96.in-addr.arpa
    IN PTR
    Response
    41.110.16.96.in-addr.arpa
    IN PTR
    a96-16-110-41deploystaticakamaitechnologiescom
  • flag-us
    DNS
    183.59.114.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    183.59.114.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    217.135.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    217.135.221.88.in-addr.arpa
    IN PTR
    Response
    217.135.221.88.in-addr.arpa
    IN PTR
    a88-221-135-217deploystaticakamaitechnologiescom
  • flag-us
    DNS
    180.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    180.178.17.96.in-addr.arpa
    IN PTR
    Response
    180.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-180deploystaticakamaitechnologiescom
  • flag-us
    DNS
    14.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 104.20.67.143:443
    https://pastebin.com/raw/ubFNTPjt
    tls, http
    a397b30b1023379e88a570dddc023ddd.exe
    1.0kB
    4.6kB
    12
    8

    HTTP Request

    GET https://pastebin.com/raw/ubFNTPjt

    HTTP Response

    404
  • 8.8.8.8:53
    0.204.248.87.in-addr.arpa
    dns
    71 B
    116 B
    1
    1

    DNS Request

    0.204.248.87.in-addr.arpa

  • 8.8.8.8:53
    22.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    9.228.82.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    9.228.82.20.in-addr.arpa

  • 8.8.8.8:53
    pastebin.com
    dns
    a397b30b1023379e88a570dddc023ddd.exe
    58 B
    106 B
    1
    1

    DNS Request

    pastebin.com

    DNS Response

    104.20.67.143
    104.20.68.143
    172.67.34.170

  • 8.8.8.8:53
    143.67.20.104.in-addr.arpa
    dns
    72 B
    134 B
    1
    1

    DNS Request

    143.67.20.104.in-addr.arpa

  • 8.8.8.8:53
    57.169.31.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    57.169.31.20.in-addr.arpa

  • 8.8.8.8:53
    41.110.16.96.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    41.110.16.96.in-addr.arpa

  • 8.8.8.8:53
    183.59.114.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    183.59.114.20.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    217.135.221.88.in-addr.arpa
    dns
    73 B
    139 B
    1
    1

    DNS Request

    217.135.221.88.in-addr.arpa

  • 8.8.8.8:53
    180.178.17.96.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    180.178.17.96.in-addr.arpa

  • 8.8.8.8:53
    14.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    14.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a397b30b1023379e88a570dddc023ddd.exe

    Filesize

    385KB

    MD5

    e400ae4fdd0f856234e3b94c7ba686d5

    SHA1

    8367a5ffc28bb987f06b0cbbfbe028ed4b59ec32

    SHA256

    e395114ab0c3636381f7d3caddf1c21d588d16e07b582e89071f9c7631dcfd07

    SHA512

    14adb6ca54a676dbed0cf9f9a3cbcea093390da859287badcaf1db9b7a5b8ea8c0e1cdeab26f9ceeab97bd0ef3bb49a9e36f30ebd7a6d3ab37d0d127bfb6150b

  • memory/1836-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1836-14-0x00000000015D0000-0x0000000001636000-memory.dmp

    Filesize

    408KB

  • memory/1836-20-0x0000000004F00000-0x0000000004F5F000-memory.dmp

    Filesize

    380KB

  • memory/1836-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1836-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1836-32-0x000000000B600000-0x000000000B63C000-memory.dmp

    Filesize

    240KB

  • memory/1836-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/3868-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3868-1-0x00000000014D0000-0x0000000001536000-memory.dmp

    Filesize

    408KB

  • memory/3868-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/3868-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.