Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
ba8c0b246e027879c97cb0438d135ce1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba8c0b246e027879c97cb0438d135ce1.exe
Resource
win10v2004-20240226-en
General
-
Target
ba8c0b246e027879c97cb0438d135ce1.exe
-
Size
385KB
-
MD5
ba8c0b246e027879c97cb0438d135ce1
-
SHA1
0fefbae896acf90d7b5dba46ad62c937d1a842c8
-
SHA256
cbb09d5e266fd8570f4c76b117805f233bd0cee7b69a83d22b5055769d1563d5
-
SHA512
15432657c67ad9b10bad4c6e2ee8c59c9f4cd937e27235105d9efb9fc0813eb7e1a7117db423ea6fbe72145f7d38f591d48f979d9c271f5bb37eb2cee8cba90a
-
SSDEEP
6144:l1GR2hBDZcsJXIP6neAcXVxE6PJvNLNKNJTjwL8kubAVvT/OFSQRmdIihUkE4B:l1GR2rZcsJXI4s0W0e8Zbw/nO8B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4992 ba8c0b246e027879c97cb0438d135ce1.exe -
Executes dropped EXE 1 IoCs
pid Process 4992 ba8c0b246e027879c97cb0438d135ce1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5044 ba8c0b246e027879c97cb0438d135ce1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5044 ba8c0b246e027879c97cb0438d135ce1.exe 4992 ba8c0b246e027879c97cb0438d135ce1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4992 5044 ba8c0b246e027879c97cb0438d135ce1.exe 87 PID 5044 wrote to memory of 4992 5044 ba8c0b246e027879c97cb0438d135ce1.exe 87 PID 5044 wrote to memory of 4992 5044 ba8c0b246e027879c97cb0438d135ce1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba8c0b246e027879c97cb0438d135ce1.exe"C:\Users\Admin\AppData\Local\Temp\ba8c0b246e027879c97cb0438d135ce1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\ba8c0b246e027879c97cb0438d135ce1.exeC:\Users\Admin\AppData\Local\Temp\ba8c0b246e027879c97cb0438d135ce1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5993d095737b9b995cb0dc40b3adc0c39
SHA18b464467a247962786a93d367d4bad6d5c8e48dc
SHA25651f8f4160f9d935d4bd0ff6c798d33cac4959d9e02eb7f478de039ba902f08ec
SHA5120175448bd30e0f8b776713dd9497d9aa309854e8155f55f176dc7a65e9e6b303e17ddfe025e25281df17edbe8b115a273c25d71c980b89763243d00ec07406f1