Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
cdd120e7e0923ec14becea98138db5ee.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
cdd120e7e0923ec14becea98138db5ee.exe
Resource
win10v2004-20231215-en
General
-
Target
cdd120e7e0923ec14becea98138db5ee.exe
-
Size
771KB
-
MD5
cdd120e7e0923ec14becea98138db5ee
-
SHA1
052d92ccf1a513d7c2070943f0295b815559f6dc
-
SHA256
321cefe755c25472d4f5bdc608bd1626eeea7a702d54fce8b54bac4b2e7a9d1a
-
SHA512
f07836e49b618c06a939ee0d54a0d4583dbda5bc791f15d1fc7893f409a158413beba9c80fa390df31b0e2a7e2d72d1eee99a9585af1d2bd53bfb69528baba16
-
SSDEEP
24576:7HGcVvNQrZl72HA0b10hJaothZ2/T6FBBB:7HrRNQr772d/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2580 cdd120e7e0923ec14becea98138db5ee.exe -
Executes dropped EXE 1 IoCs
pid Process 2580 cdd120e7e0923ec14becea98138db5ee.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 4 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4492 cdd120e7e0923ec14becea98138db5ee.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4492 cdd120e7e0923ec14becea98138db5ee.exe 2580 cdd120e7e0923ec14becea98138db5ee.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4492 wrote to memory of 2580 4492 cdd120e7e0923ec14becea98138db5ee.exe 87 PID 4492 wrote to memory of 2580 4492 cdd120e7e0923ec14becea98138db5ee.exe 87 PID 4492 wrote to memory of 2580 4492 cdd120e7e0923ec14becea98138db5ee.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdd120e7e0923ec14becea98138db5ee.exe"C:\Users\Admin\AppData\Local\Temp\cdd120e7e0923ec14becea98138db5ee.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\cdd120e7e0923ec14becea98138db5ee.exeC:\Users\Admin\AppData\Local\Temp\cdd120e7e0923ec14becea98138db5ee.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD53e74a6d7c32057580a9f0ceeeba4c01c
SHA1619dd898474b65581e0294fd10c7f7454700b49b
SHA2563af2440f2101be6acc6890926cb5ecbf2edbc4636fa29e3e6980743f8657f306
SHA512091ae9fcc3aecf900dc56047027647aa083541dbe628d65ed9ec9260192ca129aacc77269dac12389cd7589ad80176aab981d11f0f63c11e91f6ccf69babf807