Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
aa2818625eb8a4703ac7b8b18e3ea470.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa2818625eb8a4703ac7b8b18e3ea470.exe
Resource
win10v2004-20240226-en
General
-
Target
aa2818625eb8a4703ac7b8b18e3ea470.exe
-
Size
385KB
-
MD5
aa2818625eb8a4703ac7b8b18e3ea470
-
SHA1
8851199ae292231a0ab6c1e1cbe17763b9453544
-
SHA256
bec3689ebfba9651011091eebba36a732226217373720c36e33ebc045f0b67db
-
SHA512
3d60fb961af4af3dde7f69ecb66ee98861964e98ddfa19b3ba3b432f4579884d629aa99ead418a4e0fbef541e70e1a34502847c26bfdd1376cfac04b1b5bde79
-
SSDEEP
12288:JPjtAnOzTSz1JT9KEx1Kb9C1zTrv2B4SyCXFzcRB:JPR6O/SPYHb9CNvIGRB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1188 aa2818625eb8a4703ac7b8b18e3ea470.exe -
Executes dropped EXE 1 IoCs
pid Process 1188 aa2818625eb8a4703ac7b8b18e3ea470.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2764 aa2818625eb8a4703ac7b8b18e3ea470.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2764 aa2818625eb8a4703ac7b8b18e3ea470.exe 1188 aa2818625eb8a4703ac7b8b18e3ea470.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2764 wrote to memory of 1188 2764 aa2818625eb8a4703ac7b8b18e3ea470.exe 87 PID 2764 wrote to memory of 1188 2764 aa2818625eb8a4703ac7b8b18e3ea470.exe 87 PID 2764 wrote to memory of 1188 2764 aa2818625eb8a4703ac7b8b18e3ea470.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa2818625eb8a4703ac7b8b18e3ea470.exe"C:\Users\Admin\AppData\Local\Temp\aa2818625eb8a4703ac7b8b18e3ea470.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\aa2818625eb8a4703ac7b8b18e3ea470.exeC:\Users\Admin\AppData\Local\Temp\aa2818625eb8a4703ac7b8b18e3ea470.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD58eb237ed6a40a4bcf78cd34f64f8de98
SHA1480bf66db144b2a49273455d09ce68fa55e31207
SHA256594d9075825d9914d0df4339261e8d266234037bc2bd4438c4b773f6260889c6
SHA512dc9e4f471114062ae52f7c518e0cd74beb7fc7273eafcc234b16637d9b45b8cc9ae70ca4643f5cc0d225f7fa311145fc912a5773c4cfff782e7ccd01848015c7