Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
cca95ca82b8306dafe2bd2dba7607135.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cca95ca82b8306dafe2bd2dba7607135.exe
Resource
win10v2004-20240226-en
General
-
Target
cca95ca82b8306dafe2bd2dba7607135.exe
-
Size
385KB
-
MD5
cca95ca82b8306dafe2bd2dba7607135
-
SHA1
00fc1a0293be7ccdf17e12e21cb7c2ce1ba92be7
-
SHA256
0809e9b6d5808848962e45f046d1c8629cb295a2ecab9f32d96e0795233865f7
-
SHA512
0f65243729b4204209b3abdb4b2af65f893c8a3b7152ace2ca47c0ecad81d863100ac9e447a6d394db184700e01011b59675e65bb424d883852db89babee976d
-
SSDEEP
12288:hOVq86ajvcVZfEjL8L6mTsKnquPwp4yvB:hCBrCfuL8mUlnquPW4yvB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4296 cca95ca82b8306dafe2bd2dba7607135.exe -
Executes dropped EXE 1 IoCs
pid Process 4296 cca95ca82b8306dafe2bd2dba7607135.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 10 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3348 cca95ca82b8306dafe2bd2dba7607135.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3348 cca95ca82b8306dafe2bd2dba7607135.exe 4296 cca95ca82b8306dafe2bd2dba7607135.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3348 wrote to memory of 4296 3348 cca95ca82b8306dafe2bd2dba7607135.exe 88 PID 3348 wrote to memory of 4296 3348 cca95ca82b8306dafe2bd2dba7607135.exe 88 PID 3348 wrote to memory of 4296 3348 cca95ca82b8306dafe2bd2dba7607135.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cca95ca82b8306dafe2bd2dba7607135.exe"C:\Users\Admin\AppData\Local\Temp\cca95ca82b8306dafe2bd2dba7607135.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\cca95ca82b8306dafe2bd2dba7607135.exeC:\Users\Admin\AppData\Local\Temp\cca95ca82b8306dafe2bd2dba7607135.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5acdbf317b16f8651f9d8e69c03c5c532
SHA17d871d0c2056909e7555bd5dbc19841449bcdc29
SHA256dd21db1c20fa6902be6a6812cc65c38a5d2edf17ca5ab15cbabacb01d745ad0a
SHA5123412b87fe00e631436741ddc609107406ce1de7fed9aa8bf4f98b92d2e763c82ec983eaa2c9f58f0f96487fbda6c01e54df9673ec1c2fe409979af4ab8c8e4bd