Analysis

  • max time kernel
    181s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 07:09

General

  • Target

    0dc74eb5909b6324e4451dd5ca5e9ce9.exe

  • Size

    1000KB

  • MD5

    0dc74eb5909b6324e4451dd5ca5e9ce9

  • SHA1

    a5ceb667b5f22b29c9cf355f69c0f3f220d658fc

  • SHA256

    97c0087da0bd9f31f135dadaf77e189d7c1bf640165f0d9f903a565dd12ce957

  • SHA512

    349df40e33b5f80abeaf6f69748879817eb0441b3f3df992fcc965b1559659ca8eab789bcc8fd54d4ec8256cc5d9dae12ce86296efd38ffbf474a0ef1ea09f2a

  • SSDEEP

    24576:AIHP60iLD0WjghOm8f1K1B+5vMiqt0gj2ed:THP65ffeOm8faqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0dc74eb5909b6324e4451dd5ca5e9ce9.exe
    "C:\Users\Admin\AppData\Local\Temp\0dc74eb5909b6324e4451dd5ca5e9ce9.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Users\Admin\AppData\Local\Temp\0dc74eb5909b6324e4451dd5ca5e9ce9.exe
      C:\Users\Admin\AppData\Local\Temp\0dc74eb5909b6324e4451dd5ca5e9ce9.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\0dc74eb5909b6324e4451dd5ca5e9ce9.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:4448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0dc74eb5909b6324e4451dd5ca5e9ce9.exe

    Filesize

    690KB

    MD5

    9d33a18c6b9257870191119a4a624a08

    SHA1

    2f40ece1451f69455952889681fdb6028a662c93

    SHA256

    514a5129e2e2689495bba387912be4e0e008be31b984f8384ac82c414ec00bdf

    SHA512

    1519214f4b17dad3bd937d3fd14e4a54d5a7d38252dae0ff37dc98391ad0c26a47e923ecfb60715cbe438d34e713c38f09b06494b0a82349f5bed959e6da5655

  • memory/1068-13-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/1068-15-0x0000000001650000-0x00000000016D3000-memory.dmp

    Filesize

    524KB

  • memory/1068-20-0x0000000004EF0000-0x0000000004F6E000-memory.dmp

    Filesize

    504KB

  • memory/1068-21-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1068-27-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/1972-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/1972-1-0x0000000001510000-0x0000000001593000-memory.dmp

    Filesize

    524KB

  • memory/1972-2-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1972-11-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB