Analysis
-
max time kernel
89s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
c9b5d4b875f8ff7181b85c81a8af8610.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c9b5d4b875f8ff7181b85c81a8af8610.exe
Resource
win10v2004-20231215-en
General
-
Target
c9b5d4b875f8ff7181b85c81a8af8610.exe
-
Size
385KB
-
MD5
c9b5d4b875f8ff7181b85c81a8af8610
-
SHA1
a9b0936b634b812bf33159673123a37117d04ea2
-
SHA256
14a99fb4a1b7c3a6cd79be4ad08fab95782402aec49003c8ee2edc78af08c2ad
-
SHA512
caae8d96e583fa00754f67c26a0aee1908907afcc80cac0adbeb3137fcf654687da2851a267401bd27cdfa54441ccd41762d4c65764d47aa0486058abac4f173
-
SSDEEP
6144:vbloObaNGMtCoWsB7JZOKCxWjy4uMLW9C0aIkIjfhPtJ/NqB:TSDNGc+sLZOKwWzuMLW9vaIk6pPtBNqB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3464 c9b5d4b875f8ff7181b85c81a8af8610.exe -
Executes dropped EXE 1 IoCs
pid Process 3464 c9b5d4b875f8ff7181b85c81a8af8610.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4804 c9b5d4b875f8ff7181b85c81a8af8610.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4804 c9b5d4b875f8ff7181b85c81a8af8610.exe 3464 c9b5d4b875f8ff7181b85c81a8af8610.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4804 wrote to memory of 3464 4804 c9b5d4b875f8ff7181b85c81a8af8610.exe 85 PID 4804 wrote to memory of 3464 4804 c9b5d4b875f8ff7181b85c81a8af8610.exe 85 PID 4804 wrote to memory of 3464 4804 c9b5d4b875f8ff7181b85c81a8af8610.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9b5d4b875f8ff7181b85c81a8af8610.exe"C:\Users\Admin\AppData\Local\Temp\c9b5d4b875f8ff7181b85c81a8af8610.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\c9b5d4b875f8ff7181b85c81a8af8610.exeC:\Users\Admin\AppData\Local\Temp\c9b5d4b875f8ff7181b85c81a8af8610.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5bf56cde0a00b9bb30392ced4d4f0f8b5
SHA1ccf141b34422ab9dd18fffc63980a342507aff37
SHA25680d3aaadd603e6f6a61289d4ef81e3099fb6c9ba3ee934d4058370adda19f7a0
SHA512d124b1646c9a7820ccbf4613e623f6cc02caf56956e7c61e9f7183a066d362418d5a452f41392e58b772512d5e10725cdd95d20a06e95734b6a11ed1b086e819