Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
b83eda7cbee17364e42e5152b6cc0c58.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b83eda7cbee17364e42e5152b6cc0c58.exe
Resource
win10v2004-20231215-en
General
-
Target
b83eda7cbee17364e42e5152b6cc0c58.exe
-
Size
385KB
-
MD5
b83eda7cbee17364e42e5152b6cc0c58
-
SHA1
a405d1a78f8c525b2fd7d09b841f2c1f1fb5fef1
-
SHA256
46ff1a7ed798768ddf852e186f86132e049eda10ff7066844d4b900b0d62b5ed
-
SHA512
951afcf09138bc653b615325feb3d8103cb79a83c2c092e9e0cef88e8e7bfcd1aa65f941d68190c2a859049d04220c94b18b170fc9fc23dae85cc0a6e560852a
-
SSDEEP
6144:/zhPi5v31VOKtttU31Dq145tR6RVDaL1RW1tcXrIB5CCPx624np+iftnwB:VPWv31Ptm1B96RpSRW7cXY5awimB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4584 b83eda7cbee17364e42e5152b6cc0c58.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 b83eda7cbee17364e42e5152b6cc0c58.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2312 b83eda7cbee17364e42e5152b6cc0c58.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2312 b83eda7cbee17364e42e5152b6cc0c58.exe 4584 b83eda7cbee17364e42e5152b6cc0c58.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 4584 2312 b83eda7cbee17364e42e5152b6cc0c58.exe 85 PID 2312 wrote to memory of 4584 2312 b83eda7cbee17364e42e5152b6cc0c58.exe 85 PID 2312 wrote to memory of 4584 2312 b83eda7cbee17364e42e5152b6cc0c58.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b83eda7cbee17364e42e5152b6cc0c58.exe"C:\Users\Admin\AppData\Local\Temp\b83eda7cbee17364e42e5152b6cc0c58.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\b83eda7cbee17364e42e5152b6cc0c58.exeC:\Users\Admin\AppData\Local\Temp\b83eda7cbee17364e42e5152b6cc0c58.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD57ca93f0141794b7a52773583640c8025
SHA10080971e28fb770d349bf345e17bb5cdc519364b
SHA256bdb561ac8146c9c25fcabf374347d33e9b0074267405cda9732c6a5e6c566a57
SHA512bea2d3432eedb9e8641312c6b8590ef21b388a6694302d2e8a067e3eeac26f7e4eb5deba7ba25838d73f51b06c97d9d86faf4607f2f4e0a740482bbecbaf8737