Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 13:33
Static task
static1
Behavioral task
behavioral1
Sample
bbf003cdb7456fb5e6da1b9262173f4d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bbf003cdb7456fb5e6da1b9262173f4d.exe
Resource
win10v2004-20240226-en
General
-
Target
bbf003cdb7456fb5e6da1b9262173f4d.exe
-
Size
385KB
-
MD5
bbf003cdb7456fb5e6da1b9262173f4d
-
SHA1
d293df8a16be2843d592b1dc49d5f39c5ed0b1af
-
SHA256
5dbb9df3caa093b55939c7f0cf6c491f8e18b611ad7bd0a38be18c48526367fa
-
SHA512
3babcefd3fe2d0a158a7fcee89207c4de7793e4cb1a951964186c588326395702700a06bfb4d53f1d60a59503e45e6c77bc51da276475975b0016502f8fd28ef
-
SSDEEP
6144:J52xwtUkPghbbx8nb8/0SF7zJoR/Z5h6AjfynPXSri9Cr3CA8kYSE6cwB:ixaUkPybqnb88SFBoR/ZHTj8TtANbvB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1612 bbf003cdb7456fb5e6da1b9262173f4d.exe -
Executes dropped EXE 1 IoCs
pid Process 1612 bbf003cdb7456fb5e6da1b9262173f4d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 8 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4196 bbf003cdb7456fb5e6da1b9262173f4d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4196 bbf003cdb7456fb5e6da1b9262173f4d.exe 1612 bbf003cdb7456fb5e6da1b9262173f4d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4196 wrote to memory of 1612 4196 bbf003cdb7456fb5e6da1b9262173f4d.exe 88 PID 4196 wrote to memory of 1612 4196 bbf003cdb7456fb5e6da1b9262173f4d.exe 88 PID 4196 wrote to memory of 1612 4196 bbf003cdb7456fb5e6da1b9262173f4d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbf003cdb7456fb5e6da1b9262173f4d.exe"C:\Users\Admin\AppData\Local\Temp\bbf003cdb7456fb5e6da1b9262173f4d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\bbf003cdb7456fb5e6da1b9262173f4d.exeC:\Users\Admin\AppData\Local\Temp\bbf003cdb7456fb5e6da1b9262173f4d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD554c8e4ea1e4b3d34861c01da580da76d
SHA11de9e1a0818a2df51546b96f51008cf57d917b1f
SHA2569b0418021e864e886f5ddf3be0404787fabe345634b8bb13863e0cb75091803b
SHA51275cf207c28911a674ae111492d4771ec03a7f047e8887762384607a34b2d87525a5482f324c969af97c731f1711f8761dc8c479df2aac7a6168103f18fb60fdc