Analysis
-
max time kernel
89s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
c45b5a5a42165406f19df16ed697cefe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c45b5a5a42165406f19df16ed697cefe.exe
Resource
win10v2004-20231215-en
General
-
Target
c45b5a5a42165406f19df16ed697cefe.exe
-
Size
907KB
-
MD5
c45b5a5a42165406f19df16ed697cefe
-
SHA1
a9d1b25da853514c8f1eedfd55cbc9a56546465a
-
SHA256
3c6f3e4f3fabd10a6af0e71a431e1e892b88a9ade7f5dd6615e27a4408205e37
-
SHA512
5def19a91052bc3fee3637b84a378e76e8ed92e921cdb3ff42a2a7d34c06e5a6242abc8805d071fc088c5b8c78ce0a04d4c96242210886fcc91863b30db7bbdd
-
SSDEEP
24576:faa7Jf5G285M6wv7AjQ9Ph/79uJjvbZja/ZS1:dRS5M6wv7S6PhIlBgS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5012 c45b5a5a42165406f19df16ed697cefe.exe -
Executes dropped EXE 1 IoCs
pid Process 5012 c45b5a5a42165406f19df16ed697cefe.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 10 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1228 c45b5a5a42165406f19df16ed697cefe.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1228 c45b5a5a42165406f19df16ed697cefe.exe 5012 c45b5a5a42165406f19df16ed697cefe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1228 wrote to memory of 5012 1228 c45b5a5a42165406f19df16ed697cefe.exe 86 PID 1228 wrote to memory of 5012 1228 c45b5a5a42165406f19df16ed697cefe.exe 86 PID 1228 wrote to memory of 5012 1228 c45b5a5a42165406f19df16ed697cefe.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45b5a5a42165406f19df16ed697cefe.exe"C:\Users\Admin\AppData\Local\Temp\c45b5a5a42165406f19df16ed697cefe.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\c45b5a5a42165406f19df16ed697cefe.exeC:\Users\Admin\AppData\Local\Temp\c45b5a5a42165406f19df16ed697cefe.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5208403543c56cba5fe6c01697a9ca238
SHA1584214caa67b4312a56bacf314036cd7773d227f
SHA256e134f9598fda8e2db806ddc8a3b9be29d30775b3a9b8cbc5d49a5a348418e7fb
SHA512723209ae350541be14a2f34b8c5721746b41bd716f951c64c1e9b49b9342381fa099dc53dce9f4b0bbc8920f1f5c5b54e2fc9aa6c3bbaedc3e5f5567527f89ff