Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
cc8865342eb2a853de0346c7a9cafe12.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc8865342eb2a853de0346c7a9cafe12.exe
Resource
win10v2004-20240226-en
General
-
Target
cc8865342eb2a853de0346c7a9cafe12.exe
-
Size
385KB
-
MD5
cc8865342eb2a853de0346c7a9cafe12
-
SHA1
e78c491c770c0fbf66f182d321c63d9d1ed824e1
-
SHA256
9092d5ba942b873ce70d3c359a71fbdfc9f65aa97fd74827f992c3dbf44799e7
-
SHA512
1cb2183d6ca8dc7ce0a0eb02747a0dd885e45c8475ba3cbf0874bdc1b26d870b156d5d0090e1dfbb79c9e266e38ccf4e10809b3febf53b402f533b9237a07a3b
-
SSDEEP
6144:2CEnm7nLsVzt2Zq5c0lxFpoAQJYTaa24Uxm4D9Ww/D0t8SZ1CZ1jnjYE+AB:22LsVR2g5cKPIYM4C9r/HmCZr+AB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4600 cc8865342eb2a853de0346c7a9cafe12.exe -
Executes dropped EXE 1 IoCs
pid Process 4600 cc8865342eb2a853de0346c7a9cafe12.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 pastebin.com 27 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4548 cc8865342eb2a853de0346c7a9cafe12.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4548 cc8865342eb2a853de0346c7a9cafe12.exe 4600 cc8865342eb2a853de0346c7a9cafe12.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4548 wrote to memory of 4600 4548 cc8865342eb2a853de0346c7a9cafe12.exe 96 PID 4548 wrote to memory of 4600 4548 cc8865342eb2a853de0346c7a9cafe12.exe 96 PID 4548 wrote to memory of 4600 4548 cc8865342eb2a853de0346c7a9cafe12.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc8865342eb2a853de0346c7a9cafe12.exe"C:\Users\Admin\AppData\Local\Temp\cc8865342eb2a853de0346c7a9cafe12.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\cc8865342eb2a853de0346c7a9cafe12.exeC:\Users\Admin\AppData\Local\Temp\cc8865342eb2a853de0346c7a9cafe12.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1312 --field-trial-handle=2284,i,9807419199535700662,2319175108930815708,262144 --variations-seed-version /prefetch:81⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5f06c402d09f14d015bf06fe2ff3540c4
SHA16427a60bf1f2bde32e7445de6ca263658438ead4
SHA256622d75f3453f9a93a4563b977905f3fee0eee2f82cbbccbe7f44635750375f71
SHA512a80e609e52280265680ccdb10cd08ba3d9a731168f88052076702d7fa4fcc1dd47e19446cd753749e24aacfe41ea76ca8281987547d99a4dfdeed0f77b7b0c7f