Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 11:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
69f949c7258cf160e3bbeb76a9b56ddf.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
69f949c7258cf160e3bbeb76a9b56ddf.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
69f949c7258cf160e3bbeb76a9b56ddf.exe
-
Size
1012KB
-
MD5
69f949c7258cf160e3bbeb76a9b56ddf
-
SHA1
5081e419aae8f7e55f9c7cf2b946bb85e69fb6d9
-
SHA256
8bc3cf451e48897ff36f1b5d3d39b3ccb94087080899b7e6214976bac8bf9011
-
SHA512
ec94f2c7b7d345353e0c49023c71d31bf80569af9c9c638b90367c6f624a83bcd11fc97ffdf0c99e368f36e0530b4dbff0c6fa6f3f49ccede2f9d88274a20f16
-
SSDEEP
24576:aa3Lf5FvtWD71WlMRlZ1B+5vMiqt0gj2eR:a+dFvsW+RjqO7
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1668 69f949c7258cf160e3bbeb76a9b56ddf.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 69f949c7258cf160e3bbeb76a9b56ddf.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1668 69f949c7258cf160e3bbeb76a9b56ddf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1668 69f949c7258cf160e3bbeb76a9b56ddf.exe 1668 69f949c7258cf160e3bbeb76a9b56ddf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4784 69f949c7258cf160e3bbeb76a9b56ddf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4784 69f949c7258cf160e3bbeb76a9b56ddf.exe 1668 69f949c7258cf160e3bbeb76a9b56ddf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4784 wrote to memory of 1668 4784 69f949c7258cf160e3bbeb76a9b56ddf.exe 17 PID 4784 wrote to memory of 1668 4784 69f949c7258cf160e3bbeb76a9b56ddf.exe 17 PID 4784 wrote to memory of 1668 4784 69f949c7258cf160e3bbeb76a9b56ddf.exe 17 PID 1668 wrote to memory of 1604 1668 69f949c7258cf160e3bbeb76a9b56ddf.exe 22 PID 1668 wrote to memory of 1604 1668 69f949c7258cf160e3bbeb76a9b56ddf.exe 22 PID 1668 wrote to memory of 1604 1668 69f949c7258cf160e3bbeb76a9b56ddf.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f949c7258cf160e3bbeb76a9b56ddf.exe"C:\Users\Admin\AppData\Local\Temp\69f949c7258cf160e3bbeb76a9b56ddf.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\69f949c7258cf160e3bbeb76a9b56ddf.exeC:\Users\Admin\AppData\Local\Temp\69f949c7258cf160e3bbeb76a9b56ddf.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\69f949c7258cf160e3bbeb76a9b56ddf.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1604
-
-