Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
c2fce310fb1df3740659f8c296d38ab5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c2fce310fb1df3740659f8c296d38ab5.exe
Resource
win10v2004-20240226-en
General
-
Target
c2fce310fb1df3740659f8c296d38ab5.exe
-
Size
771KB
-
MD5
c2fce310fb1df3740659f8c296d38ab5
-
SHA1
cb5e5b15c165d556632517cd7fd9430880cd3afc
-
SHA256
1a2b5069e6222cd0ca59c9642cb7e4e66edb6189fb36c210e4933835294fe386
-
SHA512
bc66051331fcd5d385beec27281affab6afbb944540efbc9fc843e7fcd4677fb920106370a3b7331d5a2c8840fca2703c81563a5a036b7d1b43121842ecc6c84
-
SSDEEP
12288:7UJp3/VuRNLJCZIMEQdu1rgPzJLniYZ/C9OFEIif0F6rerfrEhU8zFVMB:uF/ViMEQduStvZWqEIz6qrfiTMB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3924 c2fce310fb1df3740659f8c296d38ab5.exe -
Executes dropped EXE 1 IoCs
pid Process 3924 c2fce310fb1df3740659f8c296d38ab5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3344 c2fce310fb1df3740659f8c296d38ab5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3344 c2fce310fb1df3740659f8c296d38ab5.exe 3924 c2fce310fb1df3740659f8c296d38ab5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 3924 3344 c2fce310fb1df3740659f8c296d38ab5.exe 94 PID 3344 wrote to memory of 3924 3344 c2fce310fb1df3740659f8c296d38ab5.exe 94 PID 3344 wrote to memory of 3924 3344 c2fce310fb1df3740659f8c296d38ab5.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2fce310fb1df3740659f8c296d38ab5.exe"C:\Users\Admin\AppData\Local\Temp\c2fce310fb1df3740659f8c296d38ab5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\c2fce310fb1df3740659f8c296d38ab5.exeC:\Users\Admin\AppData\Local\Temp\c2fce310fb1df3740659f8c296d38ab5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4360 --field-trial-handle=2232,i,11267738607351977302,107266978269557304,262144 --variations-seed-version /prefetch:81⤵PID:1252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD5f7a3c37e14d91e8f1fef613cafc6f67e
SHA16b4fbb62f7260740dd1b4d02fec3d8c7f90568a7
SHA2562ae999128b84122b0ff84f5408947bc403e8bc68ef7f970431eabdde81772c1c
SHA512051e5ce03734cfb7c2a8564ac351bd9ea124c0df3b76b2563bf58ddff865af5461d8d54d5c2c77e90e63503340a82e8c7bdad8732c486def4939418e8c52a2c1