Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe
Resource
win10v2004-20240226-en
General
-
Target
b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe
-
Size
907KB
-
MD5
b9c0bf4a0ec216073e6c3f8eeab5c6f5
-
SHA1
72ce36238b2a9cc505ae9dbefb8d021cf14e2631
-
SHA256
3d52f0cb4ff055822197c80851c9a9e9ad2db88326cc89ce9589d269e99bd5fc
-
SHA512
d45dd602931d718bd0e2e393a36f0df4c7a0c2591076c9a1df167a621e10203e2ca7dadd98227f5acaa321e4658f78df8a27e486788fc281217733c2e41c339d
-
SSDEEP
12288:uaFvd13SazalEc1cnjs0QLxsxwLK9YqAqAn/nRUYbZULHcT7jVDa/ZS1:uMd13WGc1cdYKw+SqzW/RUIGqa/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1352 b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe -
Executes dropped EXE 1 IoCs
pid Process 1352 b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5052 b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5052 b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe 1352 b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5052 wrote to memory of 1352 5052 b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe 89 PID 5052 wrote to memory of 1352 5052 b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe 89 PID 5052 wrote to memory of 1352 5052 b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe"C:\Users\Admin\AppData\Local\Temp\b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\b9c0bf4a0ec216073e6c3f8eeab5c6f5.exeC:\Users\Admin\AppData\Local\Temp\b9c0bf4a0ec216073e6c3f8eeab5c6f5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD51d74dd8809ea04ee276cccf207fb3feb
SHA10aca4da2c09fafa711a5a4ca5715601c02875bef
SHA256441c2b94006a64525478180f5dcb48d5741ad9014c0bdf39bb91b543b37aca68
SHA5123cb4e43d6178551ca9ab10d9b2ab2782ab0521135bce51d452e6025fcb5a76349b1919b225eb0d6ccc5bf39b18b21c0f49701b1a53af6040f2f7f4ec7fbe8154