Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
c1b32fa59d6ca6e2999807d2ffdedb5f.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c1b32fa59d6ca6e2999807d2ffdedb5f.exe
Resource
win10v2004-20240226-en
General
-
Target
c1b32fa59d6ca6e2999807d2ffdedb5f.exe
-
Size
385KB
-
MD5
c1b32fa59d6ca6e2999807d2ffdedb5f
-
SHA1
4dd5add77ed375963824adca3944efa8a75ee863
-
SHA256
44fcf8c63084b1b5bcdbb48cc2ae58dd19350ab30aec42920c7b7e78e749e422
-
SHA512
e2c031c7c3f76fbc76a427f533d9a2229f816f94934db4f895976a6e7d6f6a6107c77eb59f0cadecd7d28795a5795d9a1e02bef441d22cb84c73092f5e4beea2
-
SSDEEP
12288:uDO2dWv4FiUQoB0FsBspI+MCG1J4S4FBX5B:uDdxnIsBgIBtD65B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3784 c1b32fa59d6ca6e2999807d2ffdedb5f.exe -
Executes dropped EXE 1 IoCs
pid Process 3784 c1b32fa59d6ca6e2999807d2ffdedb5f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 28 pastebin.com 30 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2036 c1b32fa59d6ca6e2999807d2ffdedb5f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2036 c1b32fa59d6ca6e2999807d2ffdedb5f.exe 3784 c1b32fa59d6ca6e2999807d2ffdedb5f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2036 wrote to memory of 3784 2036 c1b32fa59d6ca6e2999807d2ffdedb5f.exe 96 PID 2036 wrote to memory of 3784 2036 c1b32fa59d6ca6e2999807d2ffdedb5f.exe 96 PID 2036 wrote to memory of 3784 2036 c1b32fa59d6ca6e2999807d2ffdedb5f.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b32fa59d6ca6e2999807d2ffdedb5f.exe"C:\Users\Admin\AppData\Local\Temp\c1b32fa59d6ca6e2999807d2ffdedb5f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\c1b32fa59d6ca6e2999807d2ffdedb5f.exeC:\Users\Admin\AppData\Local\Temp\c1b32fa59d6ca6e2999807d2ffdedb5f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD515bc15e28102816f4fd2ec2490ee63df
SHA1090695f89053a8fc4a96cbd0ed0913b4844780c1
SHA256391b6e4f2f64777ddf9f5ed9be46c1d5eb715dd0578fa77d0cf8f106482ef035
SHA5125124889dfb6f806140c45f3531acc68088e4a5fcb1879a38ef9609f77a23f865c0ef49069c81b478e9e4fb537941e79f43c4976914c6176ccd25e496ebb692bb