Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
00fd7dd7a4017196cba1a01f44ea8ac8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00fd7dd7a4017196cba1a01f44ea8ac8.exe
Resource
win10v2004-20231215-en
General
-
Target
00fd7dd7a4017196cba1a01f44ea8ac8.exe
-
Size
241KB
-
MD5
00fd7dd7a4017196cba1a01f44ea8ac8
-
SHA1
e607e5b61c3b4b0ac486cc52f5f1e4c2c8cdd022
-
SHA256
118fa42acbc71374fdb96172f0e9e68385f5ed3046470c616b675c6b41b7622e
-
SHA512
aede473931e20a8c7584cf6f9ef0026d11e8b7ee2d813ebfe743bca3a730783d7177602a5b75951648d9ddcfd4845be710a213031cdad634065490872d098dac
-
SSDEEP
6144:vdT1lC9ZvTYpQO2Q4HudEYForFawAPDK6TNFQxPDaO3GGXeRK:V1QGyId9k8PJbQN3GGyK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3840 00fd7dd7a4017196cba1a01f44ea8ac8.exe -
Executes dropped EXE 1 IoCs
pid Process 3840 00fd7dd7a4017196cba1a01f44ea8ac8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3840 00fd7dd7a4017196cba1a01f44ea8ac8.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3840 00fd7dd7a4017196cba1a01f44ea8ac8.exe 3840 00fd7dd7a4017196cba1a01f44ea8ac8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 532 00fd7dd7a4017196cba1a01f44ea8ac8.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 532 00fd7dd7a4017196cba1a01f44ea8ac8.exe 3840 00fd7dd7a4017196cba1a01f44ea8ac8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 532 wrote to memory of 3840 532 00fd7dd7a4017196cba1a01f44ea8ac8.exe 89 PID 532 wrote to memory of 3840 532 00fd7dd7a4017196cba1a01f44ea8ac8.exe 89 PID 532 wrote to memory of 3840 532 00fd7dd7a4017196cba1a01f44ea8ac8.exe 89 PID 3840 wrote to memory of 4436 3840 00fd7dd7a4017196cba1a01f44ea8ac8.exe 90 PID 3840 wrote to memory of 4436 3840 00fd7dd7a4017196cba1a01f44ea8ac8.exe 90 PID 3840 wrote to memory of 4436 3840 00fd7dd7a4017196cba1a01f44ea8ac8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\00fd7dd7a4017196cba1a01f44ea8ac8.exe"C:\Users\Admin\AppData\Local\Temp\00fd7dd7a4017196cba1a01f44ea8ac8.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\00fd7dd7a4017196cba1a01f44ea8ac8.exeC:\Users\Admin\AppData\Local\Temp\00fd7dd7a4017196cba1a01f44ea8ac8.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\00fd7dd7a4017196cba1a01f44ea8ac8.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4436
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD5445e9aaaa5f0de96d01fc188a6aa69f7
SHA1b7bc92f026959aa97a7c027c8f4ed8b19dc0b06e
SHA25613441c26649da08fa69904f4d849142b9cfa07118a96051fbbeefff033e23268
SHA5129c251b27458cb5598b6771e37ee7e7448ce0334e657b14917027cbceb9d77d87d086bc3affef74365197bea16be0fc440a9aff6d5b9ad6603cb20c70aab1cc06