Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
b6031ea08ee6cd0be92f62f9db00cd2a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b6031ea08ee6cd0be92f62f9db00cd2a.exe
Resource
win10v2004-20240226-en
General
-
Target
b6031ea08ee6cd0be92f62f9db00cd2a.exe
-
Size
907KB
-
MD5
b6031ea08ee6cd0be92f62f9db00cd2a
-
SHA1
1a73c480b21824a571df3ad78996996a5467bad7
-
SHA256
ff385247bf85a02d4e611cc26f1aa672dc55463296b79288b0dd0d3dbbfe87da
-
SHA512
b617d0bbe0e15a33d585102de2b8e758d6f017d52876754271f92347bc11f5f65511a74907d7abd51d79451a97367aa387dae6245aac1472b6ab4a13b71cd9dd
-
SSDEEP
24576:YG298enQHrR2f0OMgFFgTaYTrCvvY1QJmp4A8Pcla/ZS1:YG2Iof0JKvFmpZ8EgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 992 b6031ea08ee6cd0be92f62f9db00cd2a.exe -
Executes dropped EXE 1 IoCs
pid Process 992 b6031ea08ee6cd0be92f62f9db00cd2a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4296 b6031ea08ee6cd0be92f62f9db00cd2a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4296 b6031ea08ee6cd0be92f62f9db00cd2a.exe 992 b6031ea08ee6cd0be92f62f9db00cd2a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4296 wrote to memory of 992 4296 b6031ea08ee6cd0be92f62f9db00cd2a.exe 89 PID 4296 wrote to memory of 992 4296 b6031ea08ee6cd0be92f62f9db00cd2a.exe 89 PID 4296 wrote to memory of 992 4296 b6031ea08ee6cd0be92f62f9db00cd2a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6031ea08ee6cd0be92f62f9db00cd2a.exe"C:\Users\Admin\AppData\Local\Temp\b6031ea08ee6cd0be92f62f9db00cd2a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\b6031ea08ee6cd0be92f62f9db00cd2a.exeC:\Users\Admin\AppData\Local\Temp\b6031ea08ee6cd0be92f62f9db00cd2a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5a0e9dad8bc4629f200c76ba7f263e602
SHA1fb58e2030f9a232ef6064fdb043c1cf93e1a4c55
SHA2567c0882c58b563e78563e12f0d3f49a53dbea7e16b0744b0a1b186d13366f7dec
SHA512cdfe8d83e24ef8fdd8f68ced823dc92aad97811857d87b878cbaced2c8a20fd1f37cba851981371f0ba25cca08e4d99a98a7c2f3170bc0d2a3f29c2c65c89ca8