Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
bc95e1fef103e3eee1d43c516fe30578.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc95e1fef103e3eee1d43c516fe30578.exe
Resource
win10v2004-20240226-en
General
-
Target
bc95e1fef103e3eee1d43c516fe30578.exe
-
Size
385KB
-
MD5
bc95e1fef103e3eee1d43c516fe30578
-
SHA1
1ff54e81615509b1f844c5d7ab404d28cd872f0b
-
SHA256
d49a9b5f21e42dbf5b58e6c60099c088bf295889cddc05ade4ce3a6cef1e9d20
-
SHA512
f30abafae64e279ec19fa28315d310d7525219238586c8a97eb92810f15e8dd94f1200189a9212e5a6f446d3620ea6ca88ef0ea659c4905087587b4bd273564d
-
SSDEEP
6144:CUTIco72PeMXyrCTj7HAJ7ntBCSyq1h5b5byRy4k4NmxROqVczO9ieLUB:gj3MXnTj7gZnt/PBZyRyj3ROqVkfbB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3152 bc95e1fef103e3eee1d43c516fe30578.exe -
Executes dropped EXE 1 IoCs
pid Process 3152 bc95e1fef103e3eee1d43c516fe30578.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 10 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2400 bc95e1fef103e3eee1d43c516fe30578.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2400 bc95e1fef103e3eee1d43c516fe30578.exe 3152 bc95e1fef103e3eee1d43c516fe30578.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3152 2400 bc95e1fef103e3eee1d43c516fe30578.exe 89 PID 2400 wrote to memory of 3152 2400 bc95e1fef103e3eee1d43c516fe30578.exe 89 PID 2400 wrote to memory of 3152 2400 bc95e1fef103e3eee1d43c516fe30578.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc95e1fef103e3eee1d43c516fe30578.exe"C:\Users\Admin\AppData\Local\Temp\bc95e1fef103e3eee1d43c516fe30578.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\bc95e1fef103e3eee1d43c516fe30578.exeC:\Users\Admin\AppData\Local\Temp\bc95e1fef103e3eee1d43c516fe30578.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5dac7432921d77bee41b7298087bc4c39
SHA1322e57a4648a33e510513faa6c0593f0e92965ac
SHA256b980222e606451d0aab2fab4464cb02c1fc81fffc41bf3ae83c375a70f01ddae
SHA512e9e8bf0c8b8b9c799cf293ff264c64404fd09bf633c0d18048cf7686de6fcd8395f3f1303471feab6107de4f3ea6080bf6ff9e8718ac1e9d2524f17abb55aee0