Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 02:09
Static task
static1
Behavioral task
behavioral1
Sample
c4b3d27665a922f7828b8ce421599083.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4b3d27665a922f7828b8ce421599083.exe
Resource
win10v2004-20240226-en
General
-
Target
c4b3d27665a922f7828b8ce421599083.exe
-
Size
771KB
-
MD5
c4b3d27665a922f7828b8ce421599083
-
SHA1
2a7ee0e44ca360a1c7bba0218016135eeb6fca6f
-
SHA256
6c95faf356a9e447c85076dd692b80a1833cf767f4be3b2828beef8dde7cbb63
-
SHA512
fe596ee15ec84282d93558d5947d1091093f45e76b2d392f3e9bf04225a8e24232ddb2f5a53c626638f09225dce58ee4566984a0893a5f9c16e79225711e33c9
-
SSDEEP
24576:ulTARh3JVw3Y4Dgb10hJaothZ2/T6FBBB:uAw3Y4W/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4944 c4b3d27665a922f7828b8ce421599083.exe -
Executes dropped EXE 1 IoCs
pid Process 4944 c4b3d27665a922f7828b8ce421599083.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 pastebin.com 11 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2616 c4b3d27665a922f7828b8ce421599083.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2616 c4b3d27665a922f7828b8ce421599083.exe 4944 c4b3d27665a922f7828b8ce421599083.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2616 wrote to memory of 4944 2616 c4b3d27665a922f7828b8ce421599083.exe 87 PID 2616 wrote to memory of 4944 2616 c4b3d27665a922f7828b8ce421599083.exe 87 PID 2616 wrote to memory of 4944 2616 c4b3d27665a922f7828b8ce421599083.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4b3d27665a922f7828b8ce421599083.exe"C:\Users\Admin\AppData\Local\Temp\c4b3d27665a922f7828b8ce421599083.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\c4b3d27665a922f7828b8ce421599083.exeC:\Users\Admin\AppData\Local\Temp\c4b3d27665a922f7828b8ce421599083.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD563c7e9cae8702a4005af908c4f80c427
SHA1ac70300b0736a9fc3c929d6bf097e7adb319b469
SHA2563c92f28e6febbfeb62de73b559958bcb1183225421c416d176f1dea04e011669
SHA5123176199146159786ceac0eee5f3c16712710e90d703281d5f75d3cd1e07a6ebe02f5765bfc26fcbcaaeda821abd179530b2d1fa4abfadc9581d6e2c7fe203719