Analysis
-
max time kernel
39s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
7d4d9b10112a945160ed665f36912b17.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d4d9b10112a945160ed665f36912b17.exe
Resource
win10v2004-20231215-en
General
-
Target
7d4d9b10112a945160ed665f36912b17.exe
-
Size
1000KB
-
MD5
7d4d9b10112a945160ed665f36912b17
-
SHA1
b9152536424b5267967eec6697ef160946517dd9
-
SHA256
381faecab7f720fdb06e35a03307c513e6f09b42c4f9acbb25e6a3e445679ed7
-
SHA512
ebd5c59dbf3e23221aa577bf03bf196cac8037d586087b5a0ff797a512bd439fe2603e274711eebd9562e1d396c5a3068a33cdafd61e423fec987c1c99791f67
-
SSDEEP
24576:AcYQ6bw7MpS3//Bi7HE731B+5vMiqt0gj2ed:Ac0w7C4h26qOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1672 7d4d9b10112a945160ed665f36912b17.exe -
Executes dropped EXE 1 IoCs
pid Process 1672 7d4d9b10112a945160ed665f36912b17.exe -
Loads dropped DLL 1 IoCs
pid Process 2520 7d4d9b10112a945160ed665f36912b17.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1672 7d4d9b10112a945160ed665f36912b17.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1976 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1672 7d4d9b10112a945160ed665f36912b17.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2520 7d4d9b10112a945160ed665f36912b17.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2520 7d4d9b10112a945160ed665f36912b17.exe 1672 7d4d9b10112a945160ed665f36912b17.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1672 2520 7d4d9b10112a945160ed665f36912b17.exe 16 PID 2520 wrote to memory of 1672 2520 7d4d9b10112a945160ed665f36912b17.exe 16 PID 2520 wrote to memory of 1672 2520 7d4d9b10112a945160ed665f36912b17.exe 16 PID 2520 wrote to memory of 1672 2520 7d4d9b10112a945160ed665f36912b17.exe 16 PID 1672 wrote to memory of 1976 1672 7d4d9b10112a945160ed665f36912b17.exe 29 PID 1672 wrote to memory of 1976 1672 7d4d9b10112a945160ed665f36912b17.exe 29 PID 1672 wrote to memory of 1976 1672 7d4d9b10112a945160ed665f36912b17.exe 29 PID 1672 wrote to memory of 1976 1672 7d4d9b10112a945160ed665f36912b17.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe"C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exeC:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD57fd1a704e195f8df58845378c9ca55ae
SHA1701f06c57186ba1849a082300b6dc9cbce9ffef6
SHA256997f654b0de3688d27c0b242a05f24dccb78c0bd73c259da4c63567abb0aa605
SHA512815532333fea29c818ecd1843860c2cc7e58ff013ac8b82b27a3076e46ac77f66d8513a85845c636d94b237586e92751d04d72ecd2477f0bab443a243814fd75
-
Filesize
600KB
MD55039099eaa4f97c49f84917035202da6
SHA1505a55bef15f431be83bf8cc5f5850d1f465205e
SHA256f79d93997124cb432c61683d4229b1c688b7de721ae012592fc002748c5006b5
SHA512dea090818bea94a762fe886849a470abdfd565bedefb93f7b8428f23a6bb282a4981c99a4038a538172181fe12ca213cadc207b911f3d7a37a8edb292361f785