Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
b4659ebe8486e4fff51edffed2e7176f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4659ebe8486e4fff51edffed2e7176f.exe
Resource
win10v2004-20240226-en
General
-
Target
b4659ebe8486e4fff51edffed2e7176f.exe
-
Size
385KB
-
MD5
b4659ebe8486e4fff51edffed2e7176f
-
SHA1
92d411afae7d9bc64c840c51f168f0270f3ffc57
-
SHA256
570831c1b978f7487fb80be1ffccc6ba3dd5d306ab3d9aa2c182042fdb537c87
-
SHA512
6838df67c191852d4018b964981ee7a64370d2e90626579d0ab617f9cb2bcda9729a44d8a0489557d9a5a7020a83938fe9c667e2b6f247493d74a2369d2b44e1
-
SSDEEP
12288:r0vfSUs5xRfymZjO71G9d1BrNqYkhq42r8ppOfP3ZB:YvfjsTRf7jORWd1Vz42r86ZB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5076 b4659ebe8486e4fff51edffed2e7176f.exe -
Executes dropped EXE 1 IoCs
pid Process 5076 b4659ebe8486e4fff51edffed2e7176f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 15 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4624 b4659ebe8486e4fff51edffed2e7176f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4624 b4659ebe8486e4fff51edffed2e7176f.exe 5076 b4659ebe8486e4fff51edffed2e7176f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4624 wrote to memory of 5076 4624 b4659ebe8486e4fff51edffed2e7176f.exe 90 PID 4624 wrote to memory of 5076 4624 b4659ebe8486e4fff51edffed2e7176f.exe 90 PID 4624 wrote to memory of 5076 4624 b4659ebe8486e4fff51edffed2e7176f.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4659ebe8486e4fff51edffed2e7176f.exe"C:\Users\Admin\AppData\Local\Temp\b4659ebe8486e4fff51edffed2e7176f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\b4659ebe8486e4fff51edffed2e7176f.exeC:\Users\Admin\AppData\Local\Temp\b4659ebe8486e4fff51edffed2e7176f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD513f456b2e19291185a42138b8b19fc0b
SHA1262a6783fce6bc119be1e4b27c0c88cf9b6dbb13
SHA256c71578b13070cc2f8f5cae425a18f21c25131dbc73f6a16334f3e11d48bc4b9a
SHA512dbd793086557b50c35250db8036f8d26fca4305b4ffe64580abcb098c3e459d0ea5cb7fdc9e7ec0dcfb48bd15e4c5f156276f92775461f24e7d0a921f0ed17fe