Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
e16988057803aec0dba9f5e6b8b12c28.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
e16988057803aec0dba9f5e6b8b12c28.exe
Resource
win10v2004-20240226-en
General
-
Target
e16988057803aec0dba9f5e6b8b12c28.exe
-
Size
385KB
-
MD5
e16988057803aec0dba9f5e6b8b12c28
-
SHA1
939cf6bb232fcacb13b600ab8bcac261f963f4e4
-
SHA256
83c735d6da56fe9d5e7e56a8ee7bf3dda8685ce5bc86eb4294828ccc2187b3a1
-
SHA512
7a156ae6f61871db03c760b346f025b38f8331f11d650d110adb68352f4f94fb3d2883b863997f2281fa9459dae101f29d21f5fb43b0d21602eed6e832c07e6e
-
SSDEEP
12288:khh1zc0LjGimj9ZWBHecwtYcL1il0AB6LjgrMaCieyWXXRr2O5HdKM+B:kHVVjGimj9ZWXwlXkM5LeB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4228 e16988057803aec0dba9f5e6b8b12c28.exe -
Executes dropped EXE 1 IoCs
pid Process 4228 e16988057803aec0dba9f5e6b8b12c28.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 12 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4168 e16988057803aec0dba9f5e6b8b12c28.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4168 e16988057803aec0dba9f5e6b8b12c28.exe 4228 e16988057803aec0dba9f5e6b8b12c28.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4168 wrote to memory of 4228 4168 e16988057803aec0dba9f5e6b8b12c28.exe 88 PID 4168 wrote to memory of 4228 4168 e16988057803aec0dba9f5e6b8b12c28.exe 88 PID 4168 wrote to memory of 4228 4168 e16988057803aec0dba9f5e6b8b12c28.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e16988057803aec0dba9f5e6b8b12c28.exe"C:\Users\Admin\AppData\Local\Temp\e16988057803aec0dba9f5e6b8b12c28.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\e16988057803aec0dba9f5e6b8b12c28.exeC:\Users\Admin\AppData\Local\Temp\e16988057803aec0dba9f5e6b8b12c28.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD50933d92817c3b66d76fd6da018ba71b0
SHA1b0933474b891f63e07f441c1704de093c9a0e652
SHA256fe708fb6ac09b14b46e1553ab4d8cc2002b438bb07b17f8da602f04f8cb950bd
SHA512eb0c0ce7c19d7bf8b9400edf1b6a31a4d032596c60087687b9f8928b6fd8b455dc1ed9219600fcad3b0ffad0cda2e4a9e61719b7abc8aaab270ccd398f6974ae