Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 01:59 UTC

General

  • Target

    b63abacd4e2d5445b053abcd64a39ef9.exe

  • Size

    385KB

  • MD5

    b63abacd4e2d5445b053abcd64a39ef9

  • SHA1

    a9e1ab864ea58838c1a14fb3474a1d77ee7f7ad5

  • SHA256

    d7ae027e598bca15df8b302d0e804b0ae77c8caa96cafe6a0acd48f6fc78f5ba

  • SHA512

    3916e44f8fa39e78061eb14159791eca1f72dd8d02a3491f78458bc3dd10fe375ce5dbdf121fab403d651c243f03a4369c2bffc95a6306638bb4b580edb603ec

  • SSDEEP

    6144:0Z6keB9MpsaBQD6vC6dfXXuW+FZykmud5/tou+a8dou/aBp4uUZ3B:0eB9MQDoC6dfHoFZj1pESBah5B

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b63abacd4e2d5445b053abcd64a39ef9.exe
    "C:\Users\Admin\AppData\Local\Temp\b63abacd4e2d5445b053abcd64a39ef9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\b63abacd4e2d5445b053abcd64a39ef9.exe
      C:\Users\Admin\AppData\Local\Temp\b63abacd4e2d5445b053abcd64a39ef9.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2900

Network

  • flag-us
    DNS
    pastebin.com
    b63abacd4e2d5445b053abcd64a39ef9.exe
    Remote address:
    8.8.8.8:53
    Request
    pastebin.com
    IN A
    Response
    pastebin.com
    IN A
    104.20.68.143
    pastebin.com
    IN A
    172.67.34.170
    pastebin.com
    IN A
    104.20.67.143
  • flag-us
    GET
    https://pastebin.com/raw/ubFNTPjt
    b63abacd4e2d5445b053abcd64a39ef9.exe
    Remote address:
    104.20.68.143:443
    Request
    GET /raw/ubFNTPjt HTTP/1.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: pastebin.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 404 Not Found
    Date: Wed, 06 Mar 2024 01:59:21 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    x-frame-options: DENY
    x-frame-options: DENY
    x-content-type-options: nosniff
    x-content-type-options: nosniff
    x-xss-protection: 1;mode=block
    x-xss-protection: 1;mode=block
    cache-control: public, max-age=1801
    CF-Cache-Status: EXPIRED
    Server: cloudflare
    CF-RAY: 85febef7090163f5-LHR
  • 104.20.68.143:443
    https://pastebin.com/raw/ubFNTPjt
    tls, http
    b63abacd4e2d5445b053abcd64a39ef9.exe
    1.4kB
    4.8kB
    14
    11

    HTTP Request

    GET https://pastebin.com/raw/ubFNTPjt

    HTTP Response

    404
  • 8.8.8.8:53
    pastebin.com
    dns
    b63abacd4e2d5445b053abcd64a39ef9.exe
    58 B
    106 B
    1
    1

    DNS Request

    pastebin.com

    DNS Response

    104.20.68.143
    172.67.34.170
    104.20.67.143

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\Local\Temp\Tar8AF.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\b63abacd4e2d5445b053abcd64a39ef9.exe

    Filesize

    385KB

    MD5

    05cb0d6e49fb820ac60d23f2c6c26049

    SHA1

    7f385b3aaf30f66e828a95e6bb374bbf8a4c2d17

    SHA256

    92888282b95498962218133a260b3270568c61e4ed57377a7b0233725f5f5038

    SHA512

    91e38c1e2195ce72e04a78c2213c4a01e13affc77ff4bd865eee692138504a04c0f26a5a5f37181aa7a596ed14163ccaadf25bef930498c6636f9b3b4ba84830

  • memory/1976-13-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1976-14-0x0000000002EC0000-0x0000000002F26000-memory.dmp

    Filesize

    408KB

  • memory/1976-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1976-2-0x0000000000260000-0x00000000002C6000-memory.dmp

    Filesize

    408KB

  • memory/1976-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2900-17-0x0000000000360000-0x00000000003C6000-memory.dmp

    Filesize

    408KB

  • memory/2900-20-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2900-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2900-29-0x0000000002D10000-0x0000000002D6F000-memory.dmp

    Filesize

    380KB

  • memory/2900-81-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2900-86-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2900-87-0x0000000009700000-0x000000000973C000-memory.dmp

    Filesize

    240KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.