Analysis
-
max time kernel
193s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
bd4185c304af86da85a9acfe4321e37d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd4185c304af86da85a9acfe4321e37d.exe
Resource
win10v2004-20240226-en
General
-
Target
bd4185c304af86da85a9acfe4321e37d.exe
-
Size
385KB
-
MD5
bd4185c304af86da85a9acfe4321e37d
-
SHA1
2c8e24d77031a1d2742509335564f8fe71cb7140
-
SHA256
f8833dcd6b9bc7eaf6501954477a18be98821232641ac762e8263269bc5e6380
-
SHA512
ba5c57dd94d5fab326ecb408bba1e7035a388a773e142c6ce519f3a6120a91d08a9292e9d271b2d98321dee63eb8d5b585b903124b5d4e14485b8c91aa93a986
-
SSDEEP
6144:dKQ1qN5cFVShKHL14RfCuL/nsZDkZBLHyRduxefUpsfvUFr2kv3B:sQ1qLcyh2L14Rz/ns1ULQdu+CKvyRvB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3120 bd4185c304af86da85a9acfe4321e37d.exe -
Executes dropped EXE 1 IoCs
pid Process 3120 bd4185c304af86da85a9acfe4321e37d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 50 pastebin.com 51 pastebin.com 66 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2564 bd4185c304af86da85a9acfe4321e37d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2564 bd4185c304af86da85a9acfe4321e37d.exe 3120 bd4185c304af86da85a9acfe4321e37d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2564 wrote to memory of 3120 2564 bd4185c304af86da85a9acfe4321e37d.exe 91 PID 2564 wrote to memory of 3120 2564 bd4185c304af86da85a9acfe4321e37d.exe 91 PID 2564 wrote to memory of 3120 2564 bd4185c304af86da85a9acfe4321e37d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd4185c304af86da85a9acfe4321e37d.exe"C:\Users\Admin\AppData\Local\Temp\bd4185c304af86da85a9acfe4321e37d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\bd4185c304af86da85a9acfe4321e37d.exeC:\Users\Admin\AppData\Local\Temp\bd4185c304af86da85a9acfe4321e37d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5fca9e872a00cab82d16ec71a9d04cd37
SHA1eb88dd6c8c0d30e40b7f4cca7a2bc49269c7e257
SHA256405e359bb3e913881108188b3a54ed0813502a392e815c0138643da56ec7e5d8
SHA5124289ed87bdd9fdc954b3f2ae3d411819c81c34d4e3518532969f4d61f6f62f097af4d4ab51579b3780bfdca1f7ee9fe5d37945cf1f40447d37739f75246e2b3e