Analysis
-
max time kernel
156s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
c631e072c7215466dfede3187474046e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c631e072c7215466dfede3187474046e.exe
Resource
win10v2004-20240226-en
General
-
Target
c631e072c7215466dfede3187474046e.exe
-
Size
385KB
-
MD5
c631e072c7215466dfede3187474046e
-
SHA1
2bfee4ac304f23c849d0a99d65f5a6128df501ca
-
SHA256
44c3a9d8adc7129ba5fde87f5470fecaa2c49775657260f89e5509e7c0388bee
-
SHA512
7e940bce768df8f76c90d3743170c2b045b073150c559facf8bf66a25ff1fcad4158dd99ca16251ccba1c5c3006e31858e9f53df20cf6480de309675e84314f6
-
SSDEEP
6144:VGJM76eDvV3H5JdobsgSMaaE5b2Rrvs5licpvyZn/BmS7foRHZCQhY3B:VGJMWeBX5Hg7aErE5fv85BM6weB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 744 c631e072c7215466dfede3187474046e.exe -
Executes dropped EXE 1 IoCs
pid Process 744 c631e072c7215466dfede3187474046e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 34 pastebin.com 35 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3884 c631e072c7215466dfede3187474046e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3884 c631e072c7215466dfede3187474046e.exe 744 c631e072c7215466dfede3187474046e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3884 wrote to memory of 744 3884 c631e072c7215466dfede3187474046e.exe 98 PID 3884 wrote to memory of 744 3884 c631e072c7215466dfede3187474046e.exe 98 PID 3884 wrote to memory of 744 3884 c631e072c7215466dfede3187474046e.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c631e072c7215466dfede3187474046e.exe"C:\Users\Admin\AppData\Local\Temp\c631e072c7215466dfede3187474046e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\c631e072c7215466dfede3187474046e.exeC:\Users\Admin\AppData\Local\Temp\c631e072c7215466dfede3187474046e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3956 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:81⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5081733d2c5d7f515218e92d765ff07ca
SHA1c2c6891185a2890c8c86d8840b265289be6f18f2
SHA256ff6747b63406983ed40df64f8cb8c259194531ce05f6a6e49046d57428204950
SHA512e82f4811e685a31652ed8d5a6d341fae08666d4c99d1f6b33ef898cfe3a9582ccb2c9a117c224ec53a840be8cb9c17df84e6dbbb5c133f22dc0c9c2ad877f127