Analysis
-
max time kernel
133s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:58
Static task
static1
Behavioral task
behavioral1
Sample
07c434707151b1168ccaca5d719a851a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07c434707151b1168ccaca5d719a851a.exe
Resource
win10v2004-20231215-en
General
-
Target
07c434707151b1168ccaca5d719a851a.exe
-
Size
1000KB
-
MD5
07c434707151b1168ccaca5d719a851a
-
SHA1
8d3e9c5947d559f68dfae3dd5bce13a4adac1149
-
SHA256
590b254b605d6e916c848e1e7ee101f1d3847e33e4caa86650289770cb95d97a
-
SHA512
7dda9f1077beefd441150418edce6bb2ce5c7fd3a83914319b67645409322d9105378b935258fab503abd7cf9c0738aa319ca819ad4dd16d224d8690513827c0
-
SSDEEP
12288:8x9duCaymguDouhpzmEFabGEG6LBVlfA05ECaBwQ2tb5JLrnylUPqt0gHDS7eyod:S9FarZF97YxfI1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4344 07c434707151b1168ccaca5d719a851a.exe -
Executes dropped EXE 1 IoCs
pid Process 4344 07c434707151b1168ccaca5d719a851a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4344 07c434707151b1168ccaca5d719a851a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4344 07c434707151b1168ccaca5d719a851a.exe 4344 07c434707151b1168ccaca5d719a851a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1536 07c434707151b1168ccaca5d719a851a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1536 07c434707151b1168ccaca5d719a851a.exe 4344 07c434707151b1168ccaca5d719a851a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1536 wrote to memory of 4344 1536 07c434707151b1168ccaca5d719a851a.exe 15 PID 1536 wrote to memory of 4344 1536 07c434707151b1168ccaca5d719a851a.exe 15 PID 1536 wrote to memory of 4344 1536 07c434707151b1168ccaca5d719a851a.exe 15 PID 4344 wrote to memory of 1096 4344 07c434707151b1168ccaca5d719a851a.exe 18 PID 4344 wrote to memory of 1096 4344 07c434707151b1168ccaca5d719a851a.exe 18 PID 4344 wrote to memory of 1096 4344 07c434707151b1168ccaca5d719a851a.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\07c434707151b1168ccaca5d719a851a.exe"C:\Users\Admin\AppData\Local\Temp\07c434707151b1168ccaca5d719a851a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\07c434707151b1168ccaca5d719a851a.exeC:\Users\Admin\AppData\Local\Temp\07c434707151b1168ccaca5d719a851a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\07c434707151b1168ccaca5d719a851a.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1096
-
-