Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 00:58
Static task
static1
Behavioral task
behavioral1
Sample
bd3eb2be43c9f77971825eaeab6a8393.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd3eb2be43c9f77971825eaeab6a8393.exe
Resource
win10v2004-20240226-en
General
-
Target
bd3eb2be43c9f77971825eaeab6a8393.exe
-
Size
771KB
-
MD5
bd3eb2be43c9f77971825eaeab6a8393
-
SHA1
0c3800cdff56257d175b7ca80d8ede63ae225cb5
-
SHA256
fafaeb1f3404913c76ceb3b8171d457f18d6285f8c1e639d4566ffbddc8670bc
-
SHA512
039d61ab0b85ab53a05ec22c5f86de51354dd30d4b5fbe7a8d0b06c3159315ae8634b6c33b05e5cfec10bf23da748c8dac383cbc8472d699deb4e464795446a3
-
SSDEEP
12288:DJUMxYM6p3lOm74qGllyPzJLniYZ/C9OFEIif0F6rerfrEhU8zFVMB:DKM5o3gAevytvZWqEIz6qrfiTMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1636 bd3eb2be43c9f77971825eaeab6a8393.exe -
Executes dropped EXE 1 IoCs
pid Process 1636 bd3eb2be43c9f77971825eaeab6a8393.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 32 pastebin.com 33 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 656 bd3eb2be43c9f77971825eaeab6a8393.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 656 bd3eb2be43c9f77971825eaeab6a8393.exe 1636 bd3eb2be43c9f77971825eaeab6a8393.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 656 wrote to memory of 1636 656 bd3eb2be43c9f77971825eaeab6a8393.exe 97 PID 656 wrote to memory of 1636 656 bd3eb2be43c9f77971825eaeab6a8393.exe 97 PID 656 wrote to memory of 1636 656 bd3eb2be43c9f77971825eaeab6a8393.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd3eb2be43c9f77971825eaeab6a8393.exe"C:\Users\Admin\AppData\Local\Temp\bd3eb2be43c9f77971825eaeab6a8393.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\bd3eb2be43c9f77971825eaeab6a8393.exeC:\Users\Admin\AppData\Local\Temp\bd3eb2be43c9f77971825eaeab6a8393.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1404 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD52fed507d32ac5a9d0dc63fca81c49195
SHA1797ce215488b624c6d2eaa35284f9cb0f879f90c
SHA25620e497ae979afcdbf1fa63cc5a01791272a67f494c8eb997548d7585394eb0cf
SHA51248869a6e4763b3a2b782987dddbbb84a90f677d56496b4e56087f4b86d5100d1c8f7028b62dbc885ff78ce7ef5f537e70f134dd2f82573ac18ae5e24b919efa3