Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
c9775fbc7ab6d2860da756840995599b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9775fbc7ab6d2860da756840995599b.exe
Resource
win10v2004-20240226-en
General
-
Target
c9775fbc7ab6d2860da756840995599b.exe
-
Size
907KB
-
MD5
c9775fbc7ab6d2860da756840995599b
-
SHA1
56dd8fe7e560e501d5c7c874720168640bca547b
-
SHA256
740b4bd4b3124f3cec090d370e4102e045af6a6030ed0711c0ab8e07d7c5df85
-
SHA512
3381a6fe131ff4564774036926e51694843dc082ea19a174526a4eeb0369b723cec0ac1b3b92404eaac999b8ff65bf281d3b5945c0a344944b603a4b0c39b4aa
-
SSDEEP
12288:NpBo8Q1t4mAtsidfMNSFcGOly2NNNjCEs3ACnB5jVDa/ZS1:Zo8QX9AtddAcXOlKOwZa/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1896 c9775fbc7ab6d2860da756840995599b.exe -
Executes dropped EXE 1 IoCs
pid Process 1896 c9775fbc7ab6d2860da756840995599b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 pastebin.com 27 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 860 c9775fbc7ab6d2860da756840995599b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 860 c9775fbc7ab6d2860da756840995599b.exe 1896 c9775fbc7ab6d2860da756840995599b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 860 wrote to memory of 1896 860 c9775fbc7ab6d2860da756840995599b.exe 89 PID 860 wrote to memory of 1896 860 c9775fbc7ab6d2860da756840995599b.exe 89 PID 860 wrote to memory of 1896 860 c9775fbc7ab6d2860da756840995599b.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9775fbc7ab6d2860da756840995599b.exe"C:\Users\Admin\AppData\Local\Temp\c9775fbc7ab6d2860da756840995599b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\c9775fbc7ab6d2860da756840995599b.exeC:\Users\Admin\AppData\Local\Temp\c9775fbc7ab6d2860da756840995599b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD57fcb419064508e579542a84792dee15e
SHA1145e3fdd75e7a250774c44adfe6b294495d8d212
SHA256be069f7784ed0d69cd5e3077d18f7286d8cb70a27bd2d77e1776c7842757cbcb
SHA512f8815144f0c91b1cdd010ed7cfbefad62b132d18f7473173ed78354750fd5f013b74841ca8a401ddde4b0c4205e9d4133acc0005b2b2a6bccbe7f1611d528dc9