Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
c66ea2ec216fa6a79e943fa656117258.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c66ea2ec216fa6a79e943fa656117258.exe
Resource
win10v2004-20240226-en
General
-
Target
c66ea2ec216fa6a79e943fa656117258.exe
-
Size
385KB
-
MD5
c66ea2ec216fa6a79e943fa656117258
-
SHA1
be2d6b3e54fdf9df898994e233e0d9e41a670cef
-
SHA256
80f8585b842eaea1531cf4d20afd7327824f8923777b9084ec1c04de1b07dcd5
-
SHA512
1a8d3980c3fd15174dbc5b9047ae3713bd0febd9d0ca49e64ceca8d22151f7559b7fccacfa868e63ca5b7a43f88d09c77fdd6c3971b73e23b38e40c2f8cebe99
-
SSDEEP
12288:g0I7gHef+a3FgxsfTlEuyTcOWWhNJb65164h1uQeXB:gEeGYKyRWhCD6G1N+B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3856 c66ea2ec216fa6a79e943fa656117258.exe -
Executes dropped EXE 1 IoCs
pid Process 3856 c66ea2ec216fa6a79e943fa656117258.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 36 pastebin.com 37 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 456 c66ea2ec216fa6a79e943fa656117258.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 456 c66ea2ec216fa6a79e943fa656117258.exe 3856 c66ea2ec216fa6a79e943fa656117258.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 3856 456 c66ea2ec216fa6a79e943fa656117258.exe 97 PID 456 wrote to memory of 3856 456 c66ea2ec216fa6a79e943fa656117258.exe 97 PID 456 wrote to memory of 3856 456 c66ea2ec216fa6a79e943fa656117258.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c66ea2ec216fa6a79e943fa656117258.exe"C:\Users\Admin\AppData\Local\Temp\c66ea2ec216fa6a79e943fa656117258.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\c66ea2ec216fa6a79e943fa656117258.exeC:\Users\Admin\AppData\Local\Temp\c66ea2ec216fa6a79e943fa656117258.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3608 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:5076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5ad23903464cf8f44784e5b7ca5e15931
SHA1468301b63a53d5c4cb882d29133e81e17b34dba0
SHA25606d76056dd8fb3be3f2827ededcb9ab4b21477860aa5c1402a9b72f7cc7e352e
SHA512a09ce72258ab79392ea99cda377367c4fbdb147a68c8ff5543c0bc59bd2bb2270bd0fb767911beb529578c24274a3e9474e479a94e1616ffa5cfbecd5b203144