Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
c6338f5073f8b6267d7e8b7f839f251b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6338f5073f8b6267d7e8b7f839f251b.exe
Resource
win10v2004-20240226-en
General
-
Target
c6338f5073f8b6267d7e8b7f839f251b.exe
-
Size
385KB
-
MD5
c6338f5073f8b6267d7e8b7f839f251b
-
SHA1
8b2dfe9605056c42da73789035613e63900a328c
-
SHA256
1f1e3c5fe7261115dd8d6527c4d12792ef6731dc8ef915d83c012cc73f6d9b24
-
SHA512
518249f4cc83ab599a0626f65b609bd5a941f6a0eca26107571aee5043c08663408bc13c89fd4c775a1a4b1f7b77cfb85c5966987a640c867e493ceefd638dca
-
SSDEEP
6144:/mvl9XHRsTaYW7J7jBjONQlwO7M7DvNgFn1RhwRnX9JdZLDBLjqJ2XnT9pKICB:/mlRN2LDvNgF1RhOx3vqJ2XnT2ICB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4576 c6338f5073f8b6267d7e8b7f839f251b.exe -
Executes dropped EXE 1 IoCs
pid Process 4576 c6338f5073f8b6267d7e8b7f839f251b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3172 c6338f5073f8b6267d7e8b7f839f251b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3172 c6338f5073f8b6267d7e8b7f839f251b.exe 4576 c6338f5073f8b6267d7e8b7f839f251b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3172 wrote to memory of 4576 3172 c6338f5073f8b6267d7e8b7f839f251b.exe 89 PID 3172 wrote to memory of 4576 3172 c6338f5073f8b6267d7e8b7f839f251b.exe 89 PID 3172 wrote to memory of 4576 3172 c6338f5073f8b6267d7e8b7f839f251b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6338f5073f8b6267d7e8b7f839f251b.exe"C:\Users\Admin\AppData\Local\Temp\c6338f5073f8b6267d7e8b7f839f251b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\c6338f5073f8b6267d7e8b7f839f251b.exeC:\Users\Admin\AppData\Local\Temp\c6338f5073f8b6267d7e8b7f839f251b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5e804c12495e4c81129d815f7dd59c491
SHA18ad54262609db302d992d31e49d1855a0471326a
SHA256766b3654c657359bc02f77030b72bc1dc8ed3cf62f32f8da16b3ffe4b0987797
SHA512017ca28fd927f7ccb024bc2d17585782c1bf496e371adcd04f84652ff86796addb5cb8aad393c93660d2d7ebff2bb53c3887d7a15e9c3c424da76a331afb66f2