Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 01:26
Static task
static1
Behavioral task
behavioral1
Sample
b62aa3200492928acf24c993fd15bd13.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b62aa3200492928acf24c993fd15bd13.exe
Resource
win10v2004-20240226-en
General
-
Target
b62aa3200492928acf24c993fd15bd13.exe
-
Size
385KB
-
MD5
b62aa3200492928acf24c993fd15bd13
-
SHA1
1d465d55def88053410fd3d6605cc63bbf451e74
-
SHA256
377ec98e69503eaa487c2f596749e8379bb8a53e77c9d9e16ab65b2e1007dece
-
SHA512
52e8a76dd3ab43f432eedac96d57662fd331616b82d5f9041b439faa7fd37965483dcfc600f5d52a3dc2b9f79119e206111ab42083a04c475974a0c9fcbef2a3
-
SSDEEP
12288:FZfpfH7pymu64fO4ixXUj2yF71nuKcunW0V7tIB:jpfH7pymxYO4wUjNt1VJV7tIB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 b62aa3200492928acf24c993fd15bd13.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 b62aa3200492928acf24c993fd15bd13.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 12 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1648 b62aa3200492928acf24c993fd15bd13.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1648 b62aa3200492928acf24c993fd15bd13.exe 2692 b62aa3200492928acf24c993fd15bd13.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2692 1648 b62aa3200492928acf24c993fd15bd13.exe 90 PID 1648 wrote to memory of 2692 1648 b62aa3200492928acf24c993fd15bd13.exe 90 PID 1648 wrote to memory of 2692 1648 b62aa3200492928acf24c993fd15bd13.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\b62aa3200492928acf24c993fd15bd13.exe"C:\Users\Admin\AppData\Local\Temp\b62aa3200492928acf24c993fd15bd13.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\b62aa3200492928acf24c993fd15bd13.exeC:\Users\Admin\AppData\Local\Temp\b62aa3200492928acf24c993fd15bd13.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5073f41b81cb74a02378d439d117a275a
SHA10a7baa9af8a3e8a684298b70947f770a002006f3
SHA2564a6b4f3c19b4b221be98ff5f02a39106c655d1c0fba5d0da3eb93c777f6da6ee
SHA512e1ba729ebcd6aa01bb8b969060f07b87828324f65752e33ace16fa700c6d7271180bfa6c2688f34fe5eede65efb32699e4232ff7e26bd57269ef4f23a60b49dd