Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
218d60ef23d007dbbb18e4947ca4f294.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
218d60ef23d007dbbb18e4947ca4f294.exe
Resource
win10v2004-20231215-en
General
-
Target
218d60ef23d007dbbb18e4947ca4f294.exe
-
Size
1000KB
-
MD5
218d60ef23d007dbbb18e4947ca4f294
-
SHA1
27c2a1c72e129f6e9cc14bc2094ed615115b9457
-
SHA256
a56e4b0fc745d4fb271c54d5a6a7f6498e6250861775d2ec2e6bb939b4a68acf
-
SHA512
cf9b0bc367b5bfb81b525161464be2bf7b8b5dbd5250e83b880355aff7e4ad31e4835fa6e186018df00fdef80c1612a6b272c0af0f33e6cbdaaccd182079ae5a
-
SSDEEP
12288:IlQamVlU8J2ACPIKMWJbH+Twf9+lTxlcFmp00tECaBwQ2tb5JLrnylUPqt0gHDSS:LUC2A1W0E8lTx500G1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1604 218d60ef23d007dbbb18e4947ca4f294.exe -
Executes dropped EXE 1 IoCs
pid Process 1604 218d60ef23d007dbbb18e4947ca4f294.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1604 218d60ef23d007dbbb18e4947ca4f294.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1604 218d60ef23d007dbbb18e4947ca4f294.exe 1604 218d60ef23d007dbbb18e4947ca4f294.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2548 218d60ef23d007dbbb18e4947ca4f294.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2548 218d60ef23d007dbbb18e4947ca4f294.exe 1604 218d60ef23d007dbbb18e4947ca4f294.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1604 2548 218d60ef23d007dbbb18e4947ca4f294.exe 90 PID 2548 wrote to memory of 1604 2548 218d60ef23d007dbbb18e4947ca4f294.exe 90 PID 2548 wrote to memory of 1604 2548 218d60ef23d007dbbb18e4947ca4f294.exe 90 PID 1604 wrote to memory of 3080 1604 218d60ef23d007dbbb18e4947ca4f294.exe 92 PID 1604 wrote to memory of 3080 1604 218d60ef23d007dbbb18e4947ca4f294.exe 92 PID 1604 wrote to memory of 3080 1604 218d60ef23d007dbbb18e4947ca4f294.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\218d60ef23d007dbbb18e4947ca4f294.exe"C:\Users\Admin\AppData\Local\Temp\218d60ef23d007dbbb18e4947ca4f294.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\218d60ef23d007dbbb18e4947ca4f294.exeC:\Users\Admin\AppData\Local\Temp\218d60ef23d007dbbb18e4947ca4f294.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\218d60ef23d007dbbb18e4947ca4f294.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3080
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD59421751a2c8260ef7af22c9aa14994ce
SHA1a1d22994350f8f40a271d4aee60141adf2ebb3fd
SHA256aa20dbe8aefd903e3c3b041975f448d7c17ea3ed979101462bec9d94d66ba49a
SHA512d56e8588ac42a62aa375ea77e05776ee0d7579a9db6a73d794807597dbdd6b0d630d20e200fbaf4aea6e99cbe216ae317ba1856dc9adb53f4cc9d05257d9f09f