Analysis
-
max time kernel
147s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
be66715e8da653577fe7b8585cdcdd98.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
be66715e8da653577fe7b8585cdcdd98.exe
Resource
win10v2004-20240226-en
General
-
Target
be66715e8da653577fe7b8585cdcdd98.exe
-
Size
385KB
-
MD5
be66715e8da653577fe7b8585cdcdd98
-
SHA1
dcc7024ddfef329428777ed2725c8e6501ed05cd
-
SHA256
16accc1cc77c6cffcf177627348c4a84d4d9eb6533d1e640ec42b4abb453c8bc
-
SHA512
c4cd28d1ecde7c5c62c348a778dce205d954f4d8fa11c0cca6bc6623ca985458af4dc4d449ba61f845f189d6b7cc6c0ecf36f0de2f951f01cd58795683a2ef3f
-
SSDEEP
12288:BBD66cfk8fPR2Z0VsJGfQYAWuBgOp1V4B:O6cf9Rw0uJGHABgOp1aB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1564 be66715e8da653577fe7b8585cdcdd98.exe -
Executes dropped EXE 1 IoCs
pid Process 1564 be66715e8da653577fe7b8585cdcdd98.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 pastebin.com 24 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1572 be66715e8da653577fe7b8585cdcdd98.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1572 be66715e8da653577fe7b8585cdcdd98.exe 1564 be66715e8da653577fe7b8585cdcdd98.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1564 1572 be66715e8da653577fe7b8585cdcdd98.exe 96 PID 1572 wrote to memory of 1564 1572 be66715e8da653577fe7b8585cdcdd98.exe 96 PID 1572 wrote to memory of 1564 1572 be66715e8da653577fe7b8585cdcdd98.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\be66715e8da653577fe7b8585cdcdd98.exe"C:\Users\Admin\AppData\Local\Temp\be66715e8da653577fe7b8585cdcdd98.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\be66715e8da653577fe7b8585cdcdd98.exeC:\Users\Admin\AppData\Local\Temp\be66715e8da653577fe7b8585cdcdd98.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5302894231148d5a80471b6241446a79b
SHA1ae07c999e21c90149d562040f5f8da42f9dd7400
SHA256b05e30bda1998830c9075bacbbed578e7db5833b2b16db4b2dd8e5777176a14f
SHA5125777e6f67f0aec159ae10b420798f4fcda3892c10384be72003b891065bbffa71ff787f8e75714cd901e727a135ef88e37258ae07ef2093cd533e5e32932d148