Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
b74611aa04f898b49b7688a033198cf4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b74611aa04f898b49b7688a033198cf4.exe
Resource
win10v2004-20240226-en
General
-
Target
b74611aa04f898b49b7688a033198cf4.exe
-
Size
385KB
-
MD5
b74611aa04f898b49b7688a033198cf4
-
SHA1
46654c1eb7e7e76c64c9fc15666e35dfb4ba5ddd
-
SHA256
55f94199a51771e24a3b92b17d7ebac1be94826dc941d228b2cd491153a67d97
-
SHA512
6601d2ea4599ee7d91c4e8794514a4af60f10d9a85c88600b62dc410beb840872dbaf191d12c308a91f90388c09fb0c66019df59aa953e826cf2b89b9bba87e1
-
SSDEEP
12288:6uWKH+imrneWpdkrOzDVn+P0cKjWHzateB:6DLimrn/iKzDVnI0cKjSLB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5116 b74611aa04f898b49b7688a033198cf4.exe -
Executes dropped EXE 1 IoCs
pid Process 5116 b74611aa04f898b49b7688a033198cf4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3732 b74611aa04f898b49b7688a033198cf4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3732 b74611aa04f898b49b7688a033198cf4.exe 5116 b74611aa04f898b49b7688a033198cf4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3732 wrote to memory of 5116 3732 b74611aa04f898b49b7688a033198cf4.exe 87 PID 3732 wrote to memory of 5116 3732 b74611aa04f898b49b7688a033198cf4.exe 87 PID 3732 wrote to memory of 5116 3732 b74611aa04f898b49b7688a033198cf4.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b74611aa04f898b49b7688a033198cf4.exe"C:\Users\Admin\AppData\Local\Temp\b74611aa04f898b49b7688a033198cf4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\b74611aa04f898b49b7688a033198cf4.exeC:\Users\Admin\AppData\Local\Temp\b74611aa04f898b49b7688a033198cf4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD54311e73bd85cf8e0f72c5d4d124e422f
SHA16c566edd880a27d8d468ea8262cfb834dd80c49c
SHA2566d228275692c4ffe0cb2da93825b0d3636bc03f65b366c4cfdd5c18c1a0f45d4
SHA512c5d1e9ef004776eacc00a778eda77acf20a557a4d229df82093c831f043e7840dcdb37d184178e68a30e0694494fb3689849f9cab980cd29a7f7b74578c1fb45