Analysis
-
max time kernel
90s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
cad8ec9d26f099dc31fd791ac10a248e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cad8ec9d26f099dc31fd791ac10a248e.exe
Resource
win10v2004-20231215-en
General
-
Target
cad8ec9d26f099dc31fd791ac10a248e.exe
-
Size
385KB
-
MD5
cad8ec9d26f099dc31fd791ac10a248e
-
SHA1
22bfe215f3e4a35f7a0bc72c1c2fc142a73e6ffe
-
SHA256
1d470fbe535a2c6d029e8610e7b335f5cf42502c3ede4badb386e620eaa23888
-
SHA512
4bc1764e9d653cf1b1fa1cf738b415ba0a42ead1370821f187bd5da751a426894159725c67a8c1241167f22d61c3b545e92250491770ecc9f080b9c91c03d769
-
SSDEEP
6144:+CiqO++YnhPTJveMeQdxEytO9we8sXDEOFLL0l3vVDRS/3GKpTSIj25CI+jGjreu:Rt7+uhZiRytO9w8hLI/7KEIjK+jWCr4B
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2480 cad8ec9d26f099dc31fd791ac10a248e.exe -
Executes dropped EXE 1 IoCs
pid Process 2480 cad8ec9d26f099dc31fd791ac10a248e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4556 cad8ec9d26f099dc31fd791ac10a248e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4556 cad8ec9d26f099dc31fd791ac10a248e.exe 2480 cad8ec9d26f099dc31fd791ac10a248e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2480 4556 cad8ec9d26f099dc31fd791ac10a248e.exe 86 PID 4556 wrote to memory of 2480 4556 cad8ec9d26f099dc31fd791ac10a248e.exe 86 PID 4556 wrote to memory of 2480 4556 cad8ec9d26f099dc31fd791ac10a248e.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cad8ec9d26f099dc31fd791ac10a248e.exe"C:\Users\Admin\AppData\Local\Temp\cad8ec9d26f099dc31fd791ac10a248e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\cad8ec9d26f099dc31fd791ac10a248e.exeC:\Users\Admin\AppData\Local\Temp\cad8ec9d26f099dc31fd791ac10a248e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5bbfd11423b69c4ab473506155c0f9b08
SHA178102661a2daecac42dd2ac7acc64e5de5b0765b
SHA25653459418ac08fee24ee70da1d5531444ea81c0071035967a93db4735f65b473b
SHA5126894b886dde8275b0d3cbe9c1f5060760fb52161201d852da2594b23cb5973ce840d2be2e2898f9b09fb31890bd9ac017ce25a2140539c0f0d7decc0e6b3c4eb