Analysis

  • max time kernel
    39s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 16:38

General

  • Target

    7d4d9b10112a945160ed665f36912b17.exe

  • Size

    1000KB

  • MD5

    7d4d9b10112a945160ed665f36912b17

  • SHA1

    b9152536424b5267967eec6697ef160946517dd9

  • SHA256

    381faecab7f720fdb06e35a03307c513e6f09b42c4f9acbb25e6a3e445679ed7

  • SHA512

    ebd5c59dbf3e23221aa577bf03bf196cac8037d586087b5a0ff797a512bd439fe2603e274711eebd9562e1d396c5a3068a33cdafd61e423fec987c1c99791f67

  • SSDEEP

    24576:AcYQ6bw7MpS3//Bi7HE731B+5vMiqt0gj2ed:Ac0w7C4h26qOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe
    "C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe
      C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:1976

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe

          Filesize

          1000KB

          MD5

          7fd1a704e195f8df58845378c9ca55ae

          SHA1

          701f06c57186ba1849a082300b6dc9cbce9ffef6

          SHA256

          997f654b0de3688d27c0b242a05f24dccb78c0bd73c259da4c63567abb0aa605

          SHA512

          815532333fea29c818ecd1843860c2cc7e58ff013ac8b82b27a3076e46ac77f66d8513a85845c636d94b237586e92751d04d72ecd2477f0bab443a243814fd75

        • \Users\Admin\AppData\Local\Temp\7d4d9b10112a945160ed665f36912b17.exe

          Filesize

          600KB

          MD5

          5039099eaa4f97c49f84917035202da6

          SHA1

          505a55bef15f431be83bf8cc5f5850d1f465205e

          SHA256

          f79d93997124cb432c61683d4229b1c688b7de721ae012592fc002748c5006b5

          SHA512

          dea090818bea94a762fe886849a470abdfd565bedefb93f7b8428f23a6bb282a4981c99a4038a538172181fe12ca213cadc207b911f3d7a37a8edb292361f785

        • memory/1672-23-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/1672-26-0x0000000002D90000-0x0000000002E0E000-memory.dmp

          Filesize

          504KB

        • memory/1672-17-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/1672-64-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/2520-0-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/2520-2-0x0000000000250000-0x00000000002D3000-memory.dmp

          Filesize

          524KB

        • memory/2520-1-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/2520-16-0x0000000000350000-0x00000000003D3000-memory.dmp

          Filesize

          524KB

        • memory/2520-14-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB