Analysis
-
max time kernel
142s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
bf64f380725b2defddd3fca7a1b2eb5a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf64f380725b2defddd3fca7a1b2eb5a.exe
Resource
win10v2004-20240226-en
General
-
Target
bf64f380725b2defddd3fca7a1b2eb5a.exe
-
Size
771KB
-
MD5
bf64f380725b2defddd3fca7a1b2eb5a
-
SHA1
ae81d649b952420f8edcd9eed76ab12ebac7f403
-
SHA256
3b4bbb873b009a7c75622abafef758566a5aade0cb8708f7eeea3d194ea1ae07
-
SHA512
cea8ffbd0066bf5edc1349f8ec6732d9f290f133edaf8770f908b9880784606d4e81f452ed206427edb1b08a02bcccefd064c83bcadfc320836eafafb641d490
-
SSDEEP
12288:191WsIl8NNjtdQbB4MnqU7PFoOU2b10VHmDXTuFaa2AtyGTKOF25ZoJJyhRge8B/:tSIU942N28b10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1728 bf64f380725b2defddd3fca7a1b2eb5a.exe -
Executes dropped EXE 1 IoCs
pid Process 1728 bf64f380725b2defddd3fca7a1b2eb5a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 pastebin.com 22 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3656 bf64f380725b2defddd3fca7a1b2eb5a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3656 bf64f380725b2defddd3fca7a1b2eb5a.exe 1728 bf64f380725b2defddd3fca7a1b2eb5a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3656 wrote to memory of 1728 3656 bf64f380725b2defddd3fca7a1b2eb5a.exe 97 PID 3656 wrote to memory of 1728 3656 bf64f380725b2defddd3fca7a1b2eb5a.exe 97 PID 3656 wrote to memory of 1728 3656 bf64f380725b2defddd3fca7a1b2eb5a.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf64f380725b2defddd3fca7a1b2eb5a.exe"C:\Users\Admin\AppData\Local\Temp\bf64f380725b2defddd3fca7a1b2eb5a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\bf64f380725b2defddd3fca7a1b2eb5a.exeC:\Users\Admin\AppData\Local\Temp\bf64f380725b2defddd3fca7a1b2eb5a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3960 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5354cc109233a8aa8d2dd577e7f1fc571
SHA158d59e10550487236e6d43e6e8b756c923762591
SHA2566a8827b3a5b160fba4acb48d982b1d0567f0527ad4a107d75249fb786afb2d9f
SHA512cd413b7cc0e2258b505e34e25c6bbcfd90ba3b2a83d5b334f06f3adcdb5c41d59f7f0f4efa51c22b745d31efa1b9846d57560bc3d86b7b9880ecc19ebee0b504