Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
caaaa946855bac06537a237329772086.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
caaaa946855bac06537a237329772086.exe
Resource
win10v2004-20240226-en
General
-
Target
caaaa946855bac06537a237329772086.exe
-
Size
385KB
-
MD5
caaaa946855bac06537a237329772086
-
SHA1
06d023800639930705a457376e44081159e53100
-
SHA256
5c6c04c96cbcfa8b3faec9d81dda72ea6ff4538b85de9f573954d0835d0d0e90
-
SHA512
c93f0153c03c2c7e28e3b55aebc8464516b64e4f597d1fe32405b9041f285b5ac814e4203a66d58cf3b383a1228d4aff35b5d3fa046bfeca4f165595060b5c2c
-
SSDEEP
6144:9nA74BVigYFzzL0KSaKEW5iNs7nsr0HbLyGJdkSF1HRaocB:3vY9AbF5iCDsr07L3AIHRanB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2912 caaaa946855bac06537a237329772086.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 caaaa946855bac06537a237329772086.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 7 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1692 caaaa946855bac06537a237329772086.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1692 caaaa946855bac06537a237329772086.exe 2912 caaaa946855bac06537a237329772086.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2912 1692 caaaa946855bac06537a237329772086.exe 88 PID 1692 wrote to memory of 2912 1692 caaaa946855bac06537a237329772086.exe 88 PID 1692 wrote to memory of 2912 1692 caaaa946855bac06537a237329772086.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\caaaa946855bac06537a237329772086.exe"C:\Users\Admin\AppData\Local\Temp\caaaa946855bac06537a237329772086.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\caaaa946855bac06537a237329772086.exeC:\Users\Admin\AppData\Local\Temp\caaaa946855bac06537a237329772086.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD57960e5f0154ac1950384091c14ad3250
SHA11b9d5af6cfe453ffa36913ec63778b939c9f0976
SHA25686eda678dc2d194f4013ff3dab0178f812ba937bd6b0e47b9c531262a9870bca
SHA51272fe55544c88be2bdb11eaf17c62de03c5a2d2350dc297f3695f32c91d781751fed3c819eaf21091d849c7931883d20760fc1e80ae0d887ad448550ef14cfa07