Analysis
-
max time kernel
90s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
c92b171862b08ff31ba483fdad816e5c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c92b171862b08ff31ba483fdad816e5c.exe
Resource
win10v2004-20231215-en
General
-
Target
c92b171862b08ff31ba483fdad816e5c.exe
-
Size
385KB
-
MD5
c92b171862b08ff31ba483fdad816e5c
-
SHA1
33e66a61905fe8ee1a370003a481b3caeebabf03
-
SHA256
a061e3e5027afd445518e746e7d93d0fb54135027151891d7f05bcbcc753e59a
-
SHA512
3277ce95cc63777c084b7549122d533b68df7f721077fdd74acac916142bdc491fdb69b16097292d7bae258d1185b42494bbc442b2ca36e7bd714c1833a8f432
-
SSDEEP
6144:nT9ZOGi915/S/k2k9mEfEjiDbCff8v97tesCugFdmdLBO5Kq47zf47mDLjOeTyoB:nPOd5m+gDjFF3BN8fdTBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3176 c92b171862b08ff31ba483fdad816e5c.exe -
Executes dropped EXE 1 IoCs
pid Process 3176 c92b171862b08ff31ba483fdad816e5c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4736 c92b171862b08ff31ba483fdad816e5c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4736 c92b171862b08ff31ba483fdad816e5c.exe 3176 c92b171862b08ff31ba483fdad816e5c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3176 4736 c92b171862b08ff31ba483fdad816e5c.exe 85 PID 4736 wrote to memory of 3176 4736 c92b171862b08ff31ba483fdad816e5c.exe 85 PID 4736 wrote to memory of 3176 4736 c92b171862b08ff31ba483fdad816e5c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c92b171862b08ff31ba483fdad816e5c.exe"C:\Users\Admin\AppData\Local\Temp\c92b171862b08ff31ba483fdad816e5c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\c92b171862b08ff31ba483fdad816e5c.exeC:\Users\Admin\AppData\Local\Temp\c92b171862b08ff31ba483fdad816e5c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD59e8b604f8e7ec51daa87718c697c60bb
SHA1438221b0342ceab20a1d8337a95b398d7088f7db
SHA256753106070a2c6dfae95e34b88f707075a860acc3b3ba4cdb3633fb3faf2beb18
SHA5128b19e10bdb4cb9ad36922d58d1446d86b2d1f7f265e4706799b22c066cbdc698cb7b3760e95fa065f01aa84adb4ad12224f9f22df93f064890def08f54aa134f