Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
acac4ae372ad73d48a0f47ddd02b10c8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acac4ae372ad73d48a0f47ddd02b10c8.exe
Resource
win10v2004-20240226-en
General
-
Target
acac4ae372ad73d48a0f47ddd02b10c8.exe
-
Size
385KB
-
MD5
acac4ae372ad73d48a0f47ddd02b10c8
-
SHA1
16e341a8dbb5939b0899c68db1545378f002e32f
-
SHA256
c346bfcf681a1b245f0a801d6210f8e817186ceebf3a66156ea8a020976fea57
-
SHA512
9b7cb33e883714cb249c3963a0b5abd1ece964a1a3a3bd215c70f1e8c81ab57d37e00eca98cb8178dd042d307428a743a829a35eaa662f9bb762c973f370282a
-
SSDEEP
12288:CSgrDABVRXXS1VHY3KJxni+n0VwmMcLWm9B:CSmu5wxwVL1WWB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 396 acac4ae372ad73d48a0f47ddd02b10c8.exe -
Executes dropped EXE 1 IoCs
pid Process 396 acac4ae372ad73d48a0f47ddd02b10c8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 28 pastebin.com 29 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4604 acac4ae372ad73d48a0f47ddd02b10c8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4604 acac4ae372ad73d48a0f47ddd02b10c8.exe 396 acac4ae372ad73d48a0f47ddd02b10c8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4604 wrote to memory of 396 4604 acac4ae372ad73d48a0f47ddd02b10c8.exe 97 PID 4604 wrote to memory of 396 4604 acac4ae372ad73d48a0f47ddd02b10c8.exe 97 PID 4604 wrote to memory of 396 4604 acac4ae372ad73d48a0f47ddd02b10c8.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\acac4ae372ad73d48a0f47ddd02b10c8.exe"C:\Users\Admin\AppData\Local\Temp\acac4ae372ad73d48a0f47ddd02b10c8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\acac4ae372ad73d48a0f47ddd02b10c8.exeC:\Users\Admin\AppData\Local\Temp\acac4ae372ad73d48a0f47ddd02b10c8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=940 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:81⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5f2f4b64576a0e5bc0b8196b08b155f2e
SHA1fc2caf052f71ab392e657b2e5f6f57f4d8bd1a7c
SHA2568d8f594f9fbe83b85289aefa65a764fced3f5c5d56cff6d02a69e79cda0d8fb0
SHA5126f783675684ad00b800a660c837dd5568683aec713e69661b1c68abab1d82607fa662b49da91efa44b5aa493115319b1800f76982e15d0a5b0d9c6b2d24ab223