Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 21:02
Static task
static1
Behavioral task
behavioral1
Sample
03ec023060ce5d7648f96eb62321a852.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
03ec023060ce5d7648f96eb62321a852.exe
Resource
win10v2004-20231215-en
General
-
Target
03ec023060ce5d7648f96eb62321a852.exe
-
Size
1000KB
-
MD5
03ec023060ce5d7648f96eb62321a852
-
SHA1
109215d44f431ab97b423b2f7153faf83f17daac
-
SHA256
f1a74cd92ee19a47023b27f93a6ae4d935837a17d0da876e5f2e6968299ae092
-
SHA512
8a03fe07c8fd20a5800e78949a6c5447bc7989c021f428446be88716d36c59b34ff8cd47463e56f097e0b13dc485ab6247d2e9957f7ef6f5ce165fafb2fe950b
-
SSDEEP
12288:XJljl//4QBUTEUaH20hc4x9vWXCApGXdECaBwQ2tb5JLrnylUPqt0gHDS7eyod:X/jZ/KEzWUhLpG1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4420 03ec023060ce5d7648f96eb62321a852.exe -
Executes dropped EXE 1 IoCs
pid Process 4420 03ec023060ce5d7648f96eb62321a852.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4420 03ec023060ce5d7648f96eb62321a852.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1552 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4420 03ec023060ce5d7648f96eb62321a852.exe 4420 03ec023060ce5d7648f96eb62321a852.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3260 03ec023060ce5d7648f96eb62321a852.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3260 03ec023060ce5d7648f96eb62321a852.exe 4420 03ec023060ce5d7648f96eb62321a852.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3260 wrote to memory of 4420 3260 03ec023060ce5d7648f96eb62321a852.exe 77 PID 3260 wrote to memory of 4420 3260 03ec023060ce5d7648f96eb62321a852.exe 77 PID 3260 wrote to memory of 4420 3260 03ec023060ce5d7648f96eb62321a852.exe 77 PID 4420 wrote to memory of 1552 4420 03ec023060ce5d7648f96eb62321a852.exe 94 PID 4420 wrote to memory of 1552 4420 03ec023060ce5d7648f96eb62321a852.exe 94 PID 4420 wrote to memory of 1552 4420 03ec023060ce5d7648f96eb62321a852.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\03ec023060ce5d7648f96eb62321a852.exe"C:\Users\Admin\AppData\Local\Temp\03ec023060ce5d7648f96eb62321a852.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\03ec023060ce5d7648f96eb62321a852.exeC:\Users\Admin\AppData\Local\Temp\03ec023060ce5d7648f96eb62321a852.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\03ec023060ce5d7648f96eb62321a852.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD597aee933369170697a0578d1f339afdf
SHA1ae055ea585aa0ea556a5db0ad83fda1aee40520d
SHA256e63429a24b1f63a38fbd89638b36ea1218d4a275c52886243aa48658503102a4
SHA512a488c78e249b302a766c385969683082863207b284aa5889d3e2fe3e9f658598b0e115838a725ddecd2a48ea508f9589a54bbee647e96a60dff3c19eb4fa0834