Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 03:02
Static task
static1
Behavioral task
behavioral1
Sample
01a16e5a927bcfa66d0e014fee748a5c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01a16e5a927bcfa66d0e014fee748a5c.exe
Resource
win10v2004-20231215-en
General
-
Target
01a16e5a927bcfa66d0e014fee748a5c.exe
-
Size
506KB
-
MD5
01a16e5a927bcfa66d0e014fee748a5c
-
SHA1
455a8f22f3040757465bb5246ba9253369eeb99e
-
SHA256
d5121b281c7965d9ba78574cdfda0bd52fb3515220085ebb0deab338e65bf3a3
-
SHA512
e181f918818de8fc10283575439699ae288ede252fd0544a5fa73b220f95ce32e5088c350ce104bf0e83e1293f25eb20a10e8edebb4f2bd4e49aca1d3754be74
-
SSDEEP
12288:ViW/r/oynJzjnt4ssYMtQVzjcHRoBfNEHfAT:VicrQYzt4s+tW3cHRo7EoT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2024 01a16e5a927bcfa66d0e014fee748a5c.exe -
Executes dropped EXE 1 IoCs
pid Process 2024 01a16e5a927bcfa66d0e014fee748a5c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2024 01a16e5a927bcfa66d0e014fee748a5c.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2024 01a16e5a927bcfa66d0e014fee748a5c.exe 2024 01a16e5a927bcfa66d0e014fee748a5c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4292 01a16e5a927bcfa66d0e014fee748a5c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4292 01a16e5a927bcfa66d0e014fee748a5c.exe 2024 01a16e5a927bcfa66d0e014fee748a5c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4292 wrote to memory of 2024 4292 01a16e5a927bcfa66d0e014fee748a5c.exe 89 PID 4292 wrote to memory of 2024 4292 01a16e5a927bcfa66d0e014fee748a5c.exe 89 PID 4292 wrote to memory of 2024 4292 01a16e5a927bcfa66d0e014fee748a5c.exe 89 PID 2024 wrote to memory of 1108 2024 01a16e5a927bcfa66d0e014fee748a5c.exe 92 PID 2024 wrote to memory of 1108 2024 01a16e5a927bcfa66d0e014fee748a5c.exe 92 PID 2024 wrote to memory of 1108 2024 01a16e5a927bcfa66d0e014fee748a5c.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\01a16e5a927bcfa66d0e014fee748a5c.exe"C:\Users\Admin\AppData\Local\Temp\01a16e5a927bcfa66d0e014fee748a5c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\01a16e5a927bcfa66d0e014fee748a5c.exeC:\Users\Admin\AppData\Local\Temp\01a16e5a927bcfa66d0e014fee748a5c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\01a16e5a927bcfa66d0e014fee748a5c.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1108
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD56294b7363bf76111961538ee24dc94aa
SHA10a93e70b1208946e9210cb5ac37c046ffe72eb3f
SHA256938b7cfe47665cd33e88ccb42d6f1112ccea5ea2ad85fcdb9d50fef86eeb62f9
SHA5127f081edd304001c4a45344b2282aca4c90333f6ce3ee2dcced781f733bc33492efa7930d4dfadcf30c29c294da2aff4dbbe4bc1fb8f9111853df8be8b34762ea