Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
12e2353d2417d90b2f43322db43abf86.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12e2353d2417d90b2f43322db43abf86.exe
Resource
win10v2004-20231215-en
General
-
Target
12e2353d2417d90b2f43322db43abf86.exe
-
Size
506KB
-
MD5
12e2353d2417d90b2f43322db43abf86
-
SHA1
0ce2a9f5b492aca47909da6952e85d114eda1da3
-
SHA256
0ecf90a4d1c2a781aa1cdcf7b717457cc28075c11130aea2749cf5c3c03bc7b3
-
SHA512
42640b6c8dff4f43ccb0db2c2697bcd5ad6a874d37446184871d7d84fed360c71d3cb7319c36278bde0574d10cf8fca3e84a0df750c216e413817086bf43d3e1
-
SSDEEP
12288:uu7CPwyaO1LLvqTa00QiNQ3xPcor9t36J0:TRdO13iGNQ3Jc09pV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2128 12e2353d2417d90b2f43322db43abf86.exe -
Executes dropped EXE 1 IoCs
pid Process 2128 12e2353d2417d90b2f43322db43abf86.exe -
Loads dropped DLL 1 IoCs
pid Process 2432 12e2353d2417d90b2f43322db43abf86.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2128 12e2353d2417d90b2f43322db43abf86.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2128 12e2353d2417d90b2f43322db43abf86.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2432 12e2353d2417d90b2f43322db43abf86.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2432 12e2353d2417d90b2f43322db43abf86.exe 2128 12e2353d2417d90b2f43322db43abf86.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2128 2432 12e2353d2417d90b2f43322db43abf86.exe 28 PID 2432 wrote to memory of 2128 2432 12e2353d2417d90b2f43322db43abf86.exe 28 PID 2432 wrote to memory of 2128 2432 12e2353d2417d90b2f43322db43abf86.exe 28 PID 2432 wrote to memory of 2128 2432 12e2353d2417d90b2f43322db43abf86.exe 28 PID 2128 wrote to memory of 2828 2128 12e2353d2417d90b2f43322db43abf86.exe 29 PID 2128 wrote to memory of 2828 2128 12e2353d2417d90b2f43322db43abf86.exe 29 PID 2128 wrote to memory of 2828 2128 12e2353d2417d90b2f43322db43abf86.exe 29 PID 2128 wrote to memory of 2828 2128 12e2353d2417d90b2f43322db43abf86.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12e2353d2417d90b2f43322db43abf86.exe"C:\Users\Admin\AppData\Local\Temp\12e2353d2417d90b2f43322db43abf86.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\12e2353d2417d90b2f43322db43abf86.exeC:\Users\Admin\AppData\Local\Temp\12e2353d2417d90b2f43322db43abf86.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\12e2353d2417d90b2f43322db43abf86.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
506KB
MD533bf5c2284a1838dda9da27a5c304c75
SHA1939a80e709ebcf97f1ed54d6076258ebee5986fc
SHA25640a6dd2f5339d4f86cacb6194a30279a398067c120a142e5a50d5fa4b23e421d
SHA512b75e8659147b3ca6554992d177d4302ac06cec91062cc6428246dd6b53a2970a8f3faa13fccb238fad4c4e61da397b104aae12ca322fefc6d7ad4683831b8721