Analysis
-
max time kernel
21s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 01:44
Static task
static1
Behavioral task
behavioral1
Sample
4a3a9b54a5895aeaa117252ae2a3df21.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4a3a9b54a5895aeaa117252ae2a3df21.exe
Resource
win10v2004-20231215-en
General
-
Target
4a3a9b54a5895aeaa117252ae2a3df21.exe
-
Size
506KB
-
MD5
4a3a9b54a5895aeaa117252ae2a3df21
-
SHA1
5dd8146f333be7c65c8cc2fb2dbcc4a802f52dea
-
SHA256
60b5ed542d573723ef3191aa2f157eef1a031d2a53e2609bc6d96e99dcd14f32
-
SHA512
2bcc89341d85cd1f9626d108509253fbc5622979c538a58b45370311ad45da475c8009d1e042860be7895bcb6c6aa4ab2c066b000254adae6ba1eb2914821405
-
SSDEEP
6144:XsB43ExsIxAEe9wY+z2l865hJ7VqQk7aNZVKSX4ugE87/WEvgocuPT1+gcaaOE62:XVGYd+/65UQBZet7/Tvgoyd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2912 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Loads dropped DLL 1 IoCs
pid Process 3060 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2912 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2672 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2912 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3060 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3060 4a3a9b54a5895aeaa117252ae2a3df21.exe 2912 4a3a9b54a5895aeaa117252ae2a3df21.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2912 3060 4a3a9b54a5895aeaa117252ae2a3df21.exe 18 PID 3060 wrote to memory of 2912 3060 4a3a9b54a5895aeaa117252ae2a3df21.exe 18 PID 3060 wrote to memory of 2912 3060 4a3a9b54a5895aeaa117252ae2a3df21.exe 18 PID 3060 wrote to memory of 2912 3060 4a3a9b54a5895aeaa117252ae2a3df21.exe 18 PID 2912 wrote to memory of 2672 2912 4a3a9b54a5895aeaa117252ae2a3df21.exe 16 PID 2912 wrote to memory of 2672 2912 4a3a9b54a5895aeaa117252ae2a3df21.exe 16 PID 2912 wrote to memory of 2672 2912 4a3a9b54a5895aeaa117252ae2a3df21.exe 16 PID 2912 wrote to memory of 2672 2912 4a3a9b54a5895aeaa117252ae2a3df21.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exe"C:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exeC:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4a3a9b54a5895aeaa117252ae2a3df21.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:2672