Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 21:54
Static task
static1
Behavioral task
behavioral1
Sample
fadf8aecb2a87ef721708ef591b74317.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fadf8aecb2a87ef721708ef591b74317.exe
Resource
win10v2004-20231215-en
General
-
Target
fadf8aecb2a87ef721708ef591b74317.exe
-
Size
506KB
-
MD5
fadf8aecb2a87ef721708ef591b74317
-
SHA1
d23c8f7b57158f8894f9762c2fa847c08a0966d2
-
SHA256
63ed7ac0b8e00808ec929abb087f9f4b658d51f8e1912ecae3f52a7aa0f9802a
-
SHA512
96c34ac31aa2e7092cb72b73597cd28d3da00a8c2ac35177cc55adb58a36eab94b913b2bd4805b94dd1860911ec11d1e121dfa89fc3698deeedce7163e9a817d
-
SSDEEP
12288:MV9B8EjYzMrk0tO9zM3k5EV2RtYTiTLshIqcYkcbU:MVAXMrA98juvqHvbU
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 fadf8aecb2a87ef721708ef591b74317.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 fadf8aecb2a87ef721708ef591b74317.exe -
Loads dropped DLL 1 IoCs
pid Process 2928 fadf8aecb2a87ef721708ef591b74317.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3044 fadf8aecb2a87ef721708ef591b74317.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3044 fadf8aecb2a87ef721708ef591b74317.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2928 fadf8aecb2a87ef721708ef591b74317.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2928 fadf8aecb2a87ef721708ef591b74317.exe 3044 fadf8aecb2a87ef721708ef591b74317.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2928 wrote to memory of 3044 2928 fadf8aecb2a87ef721708ef591b74317.exe 14 PID 2928 wrote to memory of 3044 2928 fadf8aecb2a87ef721708ef591b74317.exe 14 PID 2928 wrote to memory of 3044 2928 fadf8aecb2a87ef721708ef591b74317.exe 14 PID 2928 wrote to memory of 3044 2928 fadf8aecb2a87ef721708ef591b74317.exe 14 PID 3044 wrote to memory of 2568 3044 fadf8aecb2a87ef721708ef591b74317.exe 30 PID 3044 wrote to memory of 2568 3044 fadf8aecb2a87ef721708ef591b74317.exe 30 PID 3044 wrote to memory of 2568 3044 fadf8aecb2a87ef721708ef591b74317.exe 30 PID 3044 wrote to memory of 2568 3044 fadf8aecb2a87ef721708ef591b74317.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fadf8aecb2a87ef721708ef591b74317.exeC:\Users\Admin\AppData\Local\Temp\fadf8aecb2a87ef721708ef591b74317.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\fadf8aecb2a87ef721708ef591b74317.exe" /TN Google_Trk_Updater /F2⤵
- Creates scheduled task(s)
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\fadf8aecb2a87ef721708ef591b74317.exe"C:\Users\Admin\AppData\Local\Temp\fadf8aecb2a87ef721708ef591b74317.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
85KB
MD5b4336c27a81019626050e233f1835df4
SHA1cf7ecdc18c67841389711f678febca40f48d64a0
SHA25674c2bc3b14e0d0c9d712c1a90630523eaddceb4c401848b8a2b0ef725c232998
SHA5129f7c6952de25e40df3f9cda4fd7fcbd333e5a8066dc0c1b106b15c7ff5731a9129619ecd32fb44be4b620ce9eea4c7a8294c3402b7dbc405e190d1d57c01c79b
-
Filesize
93KB
MD5ccc7289d46f976c62fc357981b7dd635
SHA1d6dfa8300b3f3528ffc14f84356354759d4f1cfb
SHA25655f77a28938999771124278f074685ac54f27a352bd5127b6d420fc9116e1a05
SHA5122a98c6fb3bc314dc54076f194fc71898aeef1ec8b064bb37ce76e397346a4fc9d94b53424187a7000c7a529ebb89c51e3785372223c0898c44b3bb5ebb4e125b