Analysis
-
max time kernel
120s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
06cb50f5abcdc4525efa389429da673b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06cb50f5abcdc4525efa389429da673b.exe
Resource
win10v2004-20231215-en
General
-
Target
06cb50f5abcdc4525efa389429da673b.exe
-
Size
1000KB
-
MD5
06cb50f5abcdc4525efa389429da673b
-
SHA1
ae486476646a28f51a42655f873d025fe1beae08
-
SHA256
587600f52538e3de096707f2cb91a0cddbd2dcc38c083995899e8bb16b5ac2b0
-
SHA512
d37831e90eae0d6d2540d89178dc9933ce1fb4fd129ad92ac7dc10025d47636d1ee256b4aae960b9ddccd63a6abe1d9ea7999202ed6df024083ea72b5757c3c1
-
SSDEEP
24576:ZXBa1HmUfIgM/v8zChkLpYx1B+5vMiqt0gj2ed:dAAuInvmUqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4884 06cb50f5abcdc4525efa389429da673b.exe -
Executes dropped EXE 1 IoCs
pid Process 4884 06cb50f5abcdc4525efa389429da673b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4884 06cb50f5abcdc4525efa389429da673b.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4884 06cb50f5abcdc4525efa389429da673b.exe 4884 06cb50f5abcdc4525efa389429da673b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4852 06cb50f5abcdc4525efa389429da673b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4852 06cb50f5abcdc4525efa389429da673b.exe 4884 06cb50f5abcdc4525efa389429da673b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4884 4852 06cb50f5abcdc4525efa389429da673b.exe 88 PID 4852 wrote to memory of 4884 4852 06cb50f5abcdc4525efa389429da673b.exe 88 PID 4852 wrote to memory of 4884 4852 06cb50f5abcdc4525efa389429da673b.exe 88 PID 4884 wrote to memory of 2736 4884 06cb50f5abcdc4525efa389429da673b.exe 93 PID 4884 wrote to memory of 2736 4884 06cb50f5abcdc4525efa389429da673b.exe 93 PID 4884 wrote to memory of 2736 4884 06cb50f5abcdc4525efa389429da673b.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\06cb50f5abcdc4525efa389429da673b.exe"C:\Users\Admin\AppData\Local\Temp\06cb50f5abcdc4525efa389429da673b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\06cb50f5abcdc4525efa389429da673b.exeC:\Users\Admin\AppData\Local\Temp\06cb50f5abcdc4525efa389429da673b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\06cb50f5abcdc4525efa389429da673b.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD51a16863f2cfab099ab3529fd79f57d40
SHA1b8af96c6f725079a10882b7fa7f56064910c2469
SHA25600ff04e10ee1c93ef866fabb221ea6f2fcc5745834f3db0e1b062b4a0c579957
SHA512a9a876598ebc62d6104ddd46351b058d85342fb043f0a18dbbdd58c280fe4645961c2ea803215eb5ab75e291687d96162c32121b65afe193820e4d9b2ad5061a