Analysis
-
max time kernel
141s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
4ec2628de1e4b9008f9c8b764ba16b2e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4ec2628de1e4b9008f9c8b764ba16b2e.exe
Resource
win10v2004-20231215-en
General
-
Target
4ec2628de1e4b9008f9c8b764ba16b2e.exe
-
Size
1000KB
-
MD5
4ec2628de1e4b9008f9c8b764ba16b2e
-
SHA1
e522b26e9251aa8110c62ca4506a1d5318694ad8
-
SHA256
f892d3c06a37cf31a1eab580a3d1e69165ef5b581cde63bc05c5bf51d7ddd3ca
-
SHA512
787854259f1da0a05da85572372c703b358bbbf76b958f2b7f6755094cc69205d4bb680566dd829eac9d89034610df5ce74a20c224b634025988529f6c3bcc6f
-
SSDEEP
24576:qDr1KbT2K1lCh8kSOCJgE+U021B+5vMiqt0gj2ed:q/1Fh1/CWE60qOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4172 4ec2628de1e4b9008f9c8b764ba16b2e.exe -
Executes dropped EXE 1 IoCs
pid Process 4172 4ec2628de1e4b9008f9c8b764ba16b2e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4172 4ec2628de1e4b9008f9c8b764ba16b2e.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4172 4ec2628de1e4b9008f9c8b764ba16b2e.exe 4172 4ec2628de1e4b9008f9c8b764ba16b2e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 988 4ec2628de1e4b9008f9c8b764ba16b2e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 988 4ec2628de1e4b9008f9c8b764ba16b2e.exe 4172 4ec2628de1e4b9008f9c8b764ba16b2e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 988 wrote to memory of 4172 988 4ec2628de1e4b9008f9c8b764ba16b2e.exe 88 PID 988 wrote to memory of 4172 988 4ec2628de1e4b9008f9c8b764ba16b2e.exe 88 PID 988 wrote to memory of 4172 988 4ec2628de1e4b9008f9c8b764ba16b2e.exe 88 PID 4172 wrote to memory of 728 4172 4ec2628de1e4b9008f9c8b764ba16b2e.exe 91 PID 4172 wrote to memory of 728 4172 4ec2628de1e4b9008f9c8b764ba16b2e.exe 91 PID 4172 wrote to memory of 728 4172 4ec2628de1e4b9008f9c8b764ba16b2e.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ec2628de1e4b9008f9c8b764ba16b2e.exe"C:\Users\Admin\AppData\Local\Temp\4ec2628de1e4b9008f9c8b764ba16b2e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\4ec2628de1e4b9008f9c8b764ba16b2e.exeC:\Users\Admin\AppData\Local\Temp\4ec2628de1e4b9008f9c8b764ba16b2e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4ec2628de1e4b9008f9c8b764ba16b2e.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD53609e3a59a1d271528fa216474b5211e
SHA14f17c9f890bbcf6be7f3beb899194a072edbbb17
SHA256505cb1c925ff087b19f8389c70b385153072a2ac15b5d9759d9510b5f29fefe4
SHA512b2b4bf4a635732485bcc082ea1d95e5b6e7d52e3ad59450a0b67d5e1de8c4fbdc73be8a6dbfe9b624aad0ad2e6fa02fdc4048fe0799c134c75e8a40f5db8b4fa