Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
ca4e826009edff58b2691e87cbdf1776.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca4e826009edff58b2691e87cbdf1776.exe
Resource
win10v2004-20240226-en
General
-
Target
ca4e826009edff58b2691e87cbdf1776.exe
-
Size
907KB
-
MD5
ca4e826009edff58b2691e87cbdf1776
-
SHA1
9b3131b2c187f46dc16cff8540b783927b4d71cd
-
SHA256
1fe304ecba7de89e7777119de0fc0ef4ebf1070aa2521c808044d49cd537db29
-
SHA512
d2167a7f0c6e62bcd6a8759849387efab0979622734276e889639518d65c38d54ec101cf891e9702996cf95b76fc543ae3336bc84d4bdeffc5432ddea90e907a
-
SSDEEP
12288:I/v/n3zSuNcUyAxrTHcFhWCyLKRtTDYnxAiYtBu0hP5MrSjk4wr/QC7cjVDa/ZS1:65cUfT8FhWCyOkgBDaSreQC7Ca/ZS1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2948 ca4e826009edff58b2691e87cbdf1776.exe -
Executes dropped EXE 1 IoCs
pid Process 2948 ca4e826009edff58b2691e87cbdf1776.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 pastebin.com 17 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2544 ca4e826009edff58b2691e87cbdf1776.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2544 ca4e826009edff58b2691e87cbdf1776.exe 2948 ca4e826009edff58b2691e87cbdf1776.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2948 2544 ca4e826009edff58b2691e87cbdf1776.exe 88 PID 2544 wrote to memory of 2948 2544 ca4e826009edff58b2691e87cbdf1776.exe 88 PID 2544 wrote to memory of 2948 2544 ca4e826009edff58b2691e87cbdf1776.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4e826009edff58b2691e87cbdf1776.exe"C:\Users\Admin\AppData\Local\Temp\ca4e826009edff58b2691e87cbdf1776.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\ca4e826009edff58b2691e87cbdf1776.exeC:\Users\Admin\AppData\Local\Temp\ca4e826009edff58b2691e87cbdf1776.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5374dd8afca29769cd7d376e44b20133a
SHA100fdbd7a689d5996e13bfdea5a865777662c3282
SHA256c81d00e850975a82db3b2cc5a00012b021ffabd52fc61afe7e47ccbd541bd7bb
SHA5128d70fcde88e4bb5a3a9543f0bcde0a1da8bdf030c1f0384ef2d923bc98847f78e756860fd0a274aced48b3606d5eb48ec6703cbde13c5812c4a70372ae69fa44