Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
a397b30b1023379e88a570dddc023ddd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a397b30b1023379e88a570dddc023ddd.exe
Resource
win10v2004-20240221-en
General
-
Target
a397b30b1023379e88a570dddc023ddd.exe
-
Size
385KB
-
MD5
a397b30b1023379e88a570dddc023ddd
-
SHA1
548e456361fc1e37e6f86b298070cf575bbddb68
-
SHA256
406c7211ff817191aeb3368c838fb4de7879f2b2aaf1df5af531ce86ef0f5cdd
-
SHA512
025cd3e5f275434f5ca610ac231d8b52ab9cd1b0dfd8b2ff192cad326b7c52827b246f1b9f95f4dc22be12103c699abbdf889d173df4e1b0bde71f45d2a25c71
-
SSDEEP
6144:qIwBb1SMIUpj4FK9jel5dFTlB0ATfZt8CK7oClsRyUxfsVmB:7g4MyFUCTd3B5837oCSysXB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1836 a397b30b1023379e88a570dddc023ddd.exe -
Executes dropped EXE 1 IoCs
pid Process 1836 a397b30b1023379e88a570dddc023ddd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 13 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3868 a397b30b1023379e88a570dddc023ddd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3868 a397b30b1023379e88a570dddc023ddd.exe 1836 a397b30b1023379e88a570dddc023ddd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3868 wrote to memory of 1836 3868 a397b30b1023379e88a570dddc023ddd.exe 87 PID 3868 wrote to memory of 1836 3868 a397b30b1023379e88a570dddc023ddd.exe 87 PID 3868 wrote to memory of 1836 3868 a397b30b1023379e88a570dddc023ddd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a397b30b1023379e88a570dddc023ddd.exe"C:\Users\Admin\AppData\Local\Temp\a397b30b1023379e88a570dddc023ddd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\a397b30b1023379e88a570dddc023ddd.exeC:\Users\Admin\AppData\Local\Temp\a397b30b1023379e88a570dddc023ddd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5e400ae4fdd0f856234e3b94c7ba686d5
SHA18367a5ffc28bb987f06b0cbbfbe028ed4b59ec32
SHA256e395114ab0c3636381f7d3caddf1c21d588d16e07b582e89071f9c7631dcfd07
SHA51214adb6ca54a676dbed0cf9f9a3cbcea093390da859287badcaf1db9b7a5b8ea8c0e1cdeab26f9ceeab97bd0ef3bb49a9e36f30ebd7a6d3ab37d0d127bfb6150b