Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 06:59
Static task
static1
Behavioral task
behavioral1
Sample
0d378cae60f385be83748e9d64d823d9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d378cae60f385be83748e9d64d823d9.exe
Resource
win10v2004-20231215-en
General
-
Target
0d378cae60f385be83748e9d64d823d9.exe
-
Size
506KB
-
MD5
0d378cae60f385be83748e9d64d823d9
-
SHA1
2908b6cd0ea103d677bdd28f20d39b6fd9b1d899
-
SHA256
95e37b1407516365c0a7345abd128443d27bc4810866ee985cd2ca2695ce91f2
-
SHA512
4b59a98be3508dcbbf5ecec79c5386085a6fb1092ee762ae5988e490e3e7719ca09f16ebe1bb3e3ae58688458dddb27a5c6d0546d73c54855bdf0cb0fd518661
-
SSDEEP
12288:XCeezHRa9nSEpf+6op4lPrteJUOZenhaJbKTyduhAeRJobkHYY9h2WAWsT:VWHI9nhGz2PpeJUOwhEbcyduhAeRJ2ko
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2252 0d378cae60f385be83748e9d64d823d9.exe -
Executes dropped EXE 1 IoCs
pid Process 2252 0d378cae60f385be83748e9d64d823d9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2252 0d378cae60f385be83748e9d64d823d9.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4740 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2252 0d378cae60f385be83748e9d64d823d9.exe 2252 0d378cae60f385be83748e9d64d823d9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 336 0d378cae60f385be83748e9d64d823d9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 336 0d378cae60f385be83748e9d64d823d9.exe 2252 0d378cae60f385be83748e9d64d823d9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 336 wrote to memory of 2252 336 0d378cae60f385be83748e9d64d823d9.exe 58 PID 336 wrote to memory of 2252 336 0d378cae60f385be83748e9d64d823d9.exe 58 PID 336 wrote to memory of 2252 336 0d378cae60f385be83748e9d64d823d9.exe 58 PID 2252 wrote to memory of 4740 2252 0d378cae60f385be83748e9d64d823d9.exe 77 PID 2252 wrote to memory of 4740 2252 0d378cae60f385be83748e9d64d823d9.exe 77 PID 2252 wrote to memory of 4740 2252 0d378cae60f385be83748e9d64d823d9.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d378cae60f385be83748e9d64d823d9.exe"C:\Users\Admin\AppData\Local\Temp\0d378cae60f385be83748e9d64d823d9.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\0d378cae60f385be83748e9d64d823d9.exeC:\Users\Admin\AppData\Local\Temp\0d378cae60f385be83748e9d64d823d9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\0d378cae60f385be83748e9d64d823d9.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD51a800ba67dcdadf011170eb2cc9f4d03
SHA10f55bb6e53491eefc4d881dfc352a6406d5ca533
SHA25633b074134e4e1da2bff47a41d4f24b1f9fe1ae5427728c00b086f0fde35c05c4
SHA5127f656f395a500fec162609c511dab8cb5ffec1ac9d6c5ffa50d0558815be1dec76e69f878f96859a42ca2bfef66d8d41cbbde42c5d738b8ea21dc46171da9bc0