Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 22:41
Static task
static1
Behavioral task
behavioral1
Sample
1680589563b03c2d726c81b11d62c0bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1680589563b03c2d726c81b11d62c0bf.exe
Resource
win10v2004-20231215-en
General
-
Target
1680589563b03c2d726c81b11d62c0bf.exe
-
Size
506KB
-
MD5
1680589563b03c2d726c81b11d62c0bf
-
SHA1
4c3df47d45e0354a91e0964d77c1536871f7f26c
-
SHA256
bc4da93ba2cc9d86f3503d39bdb5a2f49e791655418fb56ef7c7d25b67f3151a
-
SHA512
88cb05355bd662b1feb39b0e5b46f192fec56ce4076d4413a2f10c78ea0b9661e76c5381f2238ef07a2c626c29d352a45d2372c6b911effd822084ad07eea607
-
SSDEEP
12288:DJzkBuzfn3YALa9Hg4OSiOGxJn6VMMjozxFUannBUvD0djZLS:hbLnHv67j4xFUanBVdlu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2476 1680589563b03c2d726c81b11d62c0bf.exe -
Executes dropped EXE 1 IoCs
pid Process 2476 1680589563b03c2d726c81b11d62c0bf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2476 1680589563b03c2d726c81b11d62c0bf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2476 1680589563b03c2d726c81b11d62c0bf.exe 2476 1680589563b03c2d726c81b11d62c0bf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2504 1680589563b03c2d726c81b11d62c0bf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2504 1680589563b03c2d726c81b11d62c0bf.exe 2476 1680589563b03c2d726c81b11d62c0bf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2476 2504 1680589563b03c2d726c81b11d62c0bf.exe 91 PID 2504 wrote to memory of 2476 2504 1680589563b03c2d726c81b11d62c0bf.exe 91 PID 2504 wrote to memory of 2476 2504 1680589563b03c2d726c81b11d62c0bf.exe 91 PID 2476 wrote to memory of 2632 2476 1680589563b03c2d726c81b11d62c0bf.exe 92 PID 2476 wrote to memory of 2632 2476 1680589563b03c2d726c81b11d62c0bf.exe 92 PID 2476 wrote to memory of 2632 2476 1680589563b03c2d726c81b11d62c0bf.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1680589563b03c2d726c81b11d62c0bf.exe"C:\Users\Admin\AppData\Local\Temp\1680589563b03c2d726c81b11d62c0bf.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\1680589563b03c2d726c81b11d62c0bf.exeC:\Users\Admin\AppData\Local\Temp\1680589563b03c2d726c81b11d62c0bf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1680589563b03c2d726c81b11d62c0bf.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD53afc5ab381e9259e39b1426497e82f09
SHA11162224ad6ea130e2cbfef8f414763bd4e9d4da8
SHA2561830431442972e92b81970400fd1f9c1137111bba4eb0a6c3bc3a4304005acd8
SHA5128f352cf67bd2aa9ce315625bb95ba2ff02c095c1be00d382e8768f2132f5eecbd5de54efc85c0da8ebb0216a3e3b97f19c5758d4a0e363c0e791bb8a1a3b31f8