Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
c868c70f6bc9ee60c74acc9d274314aa.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c868c70f6bc9ee60c74acc9d274314aa.exe
Resource
win10v2004-20240226-en
General
-
Target
c868c70f6bc9ee60c74acc9d274314aa.exe
-
Size
385KB
-
MD5
c868c70f6bc9ee60c74acc9d274314aa
-
SHA1
5594d31e7ca4a0f427259b080e89bcdc8eda5013
-
SHA256
32b76049f62c207fbb4dbac84a708370d8a49d3fb2cc4b3d7d264b34e8fe26c6
-
SHA512
2445b1318db1a87fa484872fb0dad4e01a90f2f0ab51846c2a393d87be39a321a2b9ab1e4131673bac4d10239cbb4843ef817f960c8a8a0043fd10ecd78fb4a5
-
SSDEEP
12288:vVwguTpEEzKIVzHpkWwqQDwMH+fBitDeCXsB:vOguFEGKIVzpkWw0MHAMDf8B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1620 c868c70f6bc9ee60c74acc9d274314aa.exe -
Executes dropped EXE 1 IoCs
pid Process 1620 c868c70f6bc9ee60c74acc9d274314aa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 15 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 320 c868c70f6bc9ee60c74acc9d274314aa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 320 c868c70f6bc9ee60c74acc9d274314aa.exe 1620 c868c70f6bc9ee60c74acc9d274314aa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 320 wrote to memory of 1620 320 c868c70f6bc9ee60c74acc9d274314aa.exe 89 PID 320 wrote to memory of 1620 320 c868c70f6bc9ee60c74acc9d274314aa.exe 89 PID 320 wrote to memory of 1620 320 c868c70f6bc9ee60c74acc9d274314aa.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c868c70f6bc9ee60c74acc9d274314aa.exe"C:\Users\Admin\AppData\Local\Temp\c868c70f6bc9ee60c74acc9d274314aa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\c868c70f6bc9ee60c74acc9d274314aa.exeC:\Users\Admin\AppData\Local\Temp\c868c70f6bc9ee60c74acc9d274314aa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD523cdfa119f5ff812a5da9c7ad8dff55b
SHA1e3b01cf56027f5ba298441d4e0f02c5e4b03d34b
SHA2564199962c47c5fdc5dbb0f42e337cca3cea9d66b5664446286d94d8307b84baa5
SHA51215618533205b1456a24ec6eb17dd07aa93dfbb6a43eb07540ea678c547e7556dafe8414755dbe689dfb1d348d5ddc98f66f7afaf76bb64fa1a52f4870f674af7