Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
cacd270b3701ec0aee4b9eb954f31edb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cacd270b3701ec0aee4b9eb954f31edb.exe
Resource
win10v2004-20240226-en
General
-
Target
cacd270b3701ec0aee4b9eb954f31edb.exe
-
Size
771KB
-
MD5
cacd270b3701ec0aee4b9eb954f31edb
-
SHA1
4b27f040b0e5ba8b47f5aee9b2bb4c034f75f801
-
SHA256
2564bce20fd30658154b24591cc9263b11cf41d9b4cd29886401daf9e750a0e7
-
SHA512
2e2579329f1119ffcb4f814b6e8eb12fb7da482f9ba9d05dc64de01a0b9ae70a3452a180f5256dad983e235eb67ab30d1bb42edb94f302169c78de4a570f9aa6
-
SSDEEP
12288:YOO1xmSUngeAM8APoHJ7zWO1nMkfuDXb10VHmDXTuFaa2AtyGTKOF25ZoJJyhRgT:DOOJgeuFzdxcDXb10hJaothZ2/T6FBBB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3208 cacd270b3701ec0aee4b9eb954f31edb.exe -
Executes dropped EXE 1 IoCs
pid Process 3208 cacd270b3701ec0aee4b9eb954f31edb.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4684 cacd270b3701ec0aee4b9eb954f31edb.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4684 cacd270b3701ec0aee4b9eb954f31edb.exe 3208 cacd270b3701ec0aee4b9eb954f31edb.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 3208 4684 cacd270b3701ec0aee4b9eb954f31edb.exe 88 PID 4684 wrote to memory of 3208 4684 cacd270b3701ec0aee4b9eb954f31edb.exe 88 PID 4684 wrote to memory of 3208 4684 cacd270b3701ec0aee4b9eb954f31edb.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cacd270b3701ec0aee4b9eb954f31edb.exe"C:\Users\Admin\AppData\Local\Temp\cacd270b3701ec0aee4b9eb954f31edb.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\cacd270b3701ec0aee4b9eb954f31edb.exeC:\Users\Admin\AppData\Local\Temp\cacd270b3701ec0aee4b9eb954f31edb.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD53aa14c043a5db96cb9851a8d1ca0272b
SHA1e5161ff0e2fa0cf2c7012f28613eeec4599b7a03
SHA25633ef6abf5edd876a517d9ae5ad384874398122b9d03c4cd98dc1cb2934ec29bb
SHA51252e63988af8f4e72ffdf25b275276e9f257ac54e56c5c4d73929f09489fa789ef5547e17fe0ad17a058b3549a123afb16b9409659a53479d5b8799a48a2a60c6