Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
aad0afc09ca56c39418329e06ed4f4f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aad0afc09ca56c39418329e06ed4f4f3.exe
Resource
win10v2004-20240226-en
General
-
Target
aad0afc09ca56c39418329e06ed4f4f3.exe
-
Size
385KB
-
MD5
aad0afc09ca56c39418329e06ed4f4f3
-
SHA1
515d9aa16e7f4ea712b2b78bb0dcb60ca16217cb
-
SHA256
9ba3b2c606554758be61cac4223f234b7a73a397458fef044635816533d16ac2
-
SHA512
a086af44ea557dd423114625137ecec0f3b75f46473e0d808c83c7ebddb4a974ec83d96c008cf796939be196718248d8c5572ea24340d7f8940d462397fa209b
-
SSDEEP
6144:hi/q0GymawIkdRlBKrm+EkCpcVj/jhN1tW8AaB119hdHbKgkTLgO8KusYL5OQpqB:hcGvadt9CpQ/d6aB1XlBJRseOwqE7CB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3920 aad0afc09ca56c39418329e06ed4f4f3.exe -
Executes dropped EXE 1 IoCs
pid Process 3920 aad0afc09ca56c39418329e06ed4f4f3.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4772 aad0afc09ca56c39418329e06ed4f4f3.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4772 aad0afc09ca56c39418329e06ed4f4f3.exe 3920 aad0afc09ca56c39418329e06ed4f4f3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4772 wrote to memory of 3920 4772 aad0afc09ca56c39418329e06ed4f4f3.exe 87 PID 4772 wrote to memory of 3920 4772 aad0afc09ca56c39418329e06ed4f4f3.exe 87 PID 4772 wrote to memory of 3920 4772 aad0afc09ca56c39418329e06ed4f4f3.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\aad0afc09ca56c39418329e06ed4f4f3.exe"C:\Users\Admin\AppData\Local\Temp\aad0afc09ca56c39418329e06ed4f4f3.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\aad0afc09ca56c39418329e06ed4f4f3.exeC:\Users\Admin\AppData\Local\Temp\aad0afc09ca56c39418329e06ed4f4f3.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD53077c6a295422b11f42b5d06ac93c472
SHA16898d387355d5aa2d9718d307c87381a9282afb5
SHA2561600d74b3c8e2f14133f486bc0fceeb811fa2d0a1c6d7fb338a3359154e91156
SHA51203fb491a443bfafc49a7fd5606c39fe16df413435f00ee85a5f59c6473b3c8beee7bd9387bd18001a4da00e8d01939a0190bedb0924141197f25af80cf248465