Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
c7c9ee0ad0470e0a94bd929f0e32f2dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7c9ee0ad0470e0a94bd929f0e32f2dc.exe
Resource
win10v2004-20240226-en
General
-
Target
c7c9ee0ad0470e0a94bd929f0e32f2dc.exe
-
Size
385KB
-
MD5
c7c9ee0ad0470e0a94bd929f0e32f2dc
-
SHA1
5c8b768883ddc9b1b829f30ed5afd5864ff6eaac
-
SHA256
7101581c7bc65cdbc75ec6a5ef422c8855a276c99baacd57707bfa776779cfd0
-
SHA512
dd8cc3dc17c68eaaeb9fb7756a8240cd84bad070e663e999022185c77804ce82e0e3a72135fc642c3d81dbde6c140bc58c88f724de698a01d4767ba94fddffbc
-
SSDEEP
12288:8hZj/SkJxuO1uQ6dL+GAgji+zqWlMH+GyaLW01KB:63xujQ6Fu9MuH+GyKNkB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1692 c7c9ee0ad0470e0a94bd929f0e32f2dc.exe -
Executes dropped EXE 1 IoCs
pid Process 1692 c7c9ee0ad0470e0a94bd929f0e32f2dc.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 10 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1132 c7c9ee0ad0470e0a94bd929f0e32f2dc.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1132 c7c9ee0ad0470e0a94bd929f0e32f2dc.exe 1692 c7c9ee0ad0470e0a94bd929f0e32f2dc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1692 1132 c7c9ee0ad0470e0a94bd929f0e32f2dc.exe 89 PID 1132 wrote to memory of 1692 1132 c7c9ee0ad0470e0a94bd929f0e32f2dc.exe 89 PID 1132 wrote to memory of 1692 1132 c7c9ee0ad0470e0a94bd929f0e32f2dc.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7c9ee0ad0470e0a94bd929f0e32f2dc.exe"C:\Users\Admin\AppData\Local\Temp\c7c9ee0ad0470e0a94bd929f0e32f2dc.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\c7c9ee0ad0470e0a94bd929f0e32f2dc.exeC:\Users\Admin\AppData\Local\Temp\c7c9ee0ad0470e0a94bd929f0e32f2dc.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5c36b747b692ddf23df73e253f148a89f
SHA1479125b3962f5b8f0130363e829383b28fefa209
SHA256aae0ea63ee3818b19a685c6e09eac06fc13d4133e9bf52d4f42f67aeb4095485
SHA5125dc2dad315373896ca9c544e8b49f6b8b5ec2464b0fcc2455c16b47d92060af9efd0b5d7515fe61b2542d0e0ebd2d0f08865d047c8fb55b0a46f155e52962894