Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
d686fe54ea3e3b495fde0f7ca729d87e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d686fe54ea3e3b495fde0f7ca729d87e.exe
Resource
win10v2004-20240226-en
General
-
Target
d686fe54ea3e3b495fde0f7ca729d87e.exe
-
Size
907KB
-
MD5
d686fe54ea3e3b495fde0f7ca729d87e
-
SHA1
d77e8fe96ad56cceafb146d8da784e6e7ff5297b
-
SHA256
0b6e8348423049536a26437794b79fb46889acd18f4337fb5f699de8c053a049
-
SHA512
0c7d1598ea12439de8e91184f5b2b3103bcfa5f28576f78ecf16b920cbcd4d47d91ee47d8504de413c75932d0ff1f6669668ae6d7ab360e19c9fe8d708fc5565
-
SSDEEP
24576:IVrQ7QpsYW64z43g9OBRmFBhHGeAxIxNZZOMblnQha/ZS1:AQ7QG64z43g9OfobHGTxIxNZcMggS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1408 d686fe54ea3e3b495fde0f7ca729d87e.exe -
Executes dropped EXE 1 IoCs
pid Process 1408 d686fe54ea3e3b495fde0f7ca729d87e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 11 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1276 d686fe54ea3e3b495fde0f7ca729d87e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1276 d686fe54ea3e3b495fde0f7ca729d87e.exe 1408 d686fe54ea3e3b495fde0f7ca729d87e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1408 1276 d686fe54ea3e3b495fde0f7ca729d87e.exe 90 PID 1276 wrote to memory of 1408 1276 d686fe54ea3e3b495fde0f7ca729d87e.exe 90 PID 1276 wrote to memory of 1408 1276 d686fe54ea3e3b495fde0f7ca729d87e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d686fe54ea3e3b495fde0f7ca729d87e.exe"C:\Users\Admin\AppData\Local\Temp\d686fe54ea3e3b495fde0f7ca729d87e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\d686fe54ea3e3b495fde0f7ca729d87e.exeC:\Users\Admin\AppData\Local\Temp\d686fe54ea3e3b495fde0f7ca729d87e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907KB
MD5a69fc8098ec181faf4a638efc4ef22b1
SHA1b803819393eac59249ad06ac1f41d26fd97e9ce4
SHA256be6e691d2534ff833dbf863c40a8aec49cd7d4ea989a7fb87ff01ab936a63c99
SHA51279d244e5d77fe477fbc927500c7054a81b70d3217811705db5c00be2417bd28e8de24be8ab22041410602e9d813dd00688296c8e2c13510d0079f856fd9c09d7