Analysis
-
max time kernel
167s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
09cd00d8191197b8775e4d5747283dca.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
09cd00d8191197b8775e4d5747283dca.exe
Resource
win10v2004-20231215-en
General
-
Target
09cd00d8191197b8775e4d5747283dca.exe
-
Size
1000KB
-
MD5
09cd00d8191197b8775e4d5747283dca
-
SHA1
ab0bad552171f869a341c3eea6b5927fa5daa7e8
-
SHA256
2a1fbb6d1b49c004293ce823f9559e3712b1edec093efe04cf55857b3b4e242f
-
SHA512
fa211769313cefbb28fa9d1df0bf792fc5f19f0bf9c5484057182872a10d5cca84bfacddd76e99b1355bad4f899da87e2ee946f034fd22ac82b07c6c6bf95059
-
SSDEEP
24576:QBD7XUwP3nH/96yPsONcMA1B+5vMiqt0gj2ed:QB3Xt3H/96yPs7MKqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4100 09cd00d8191197b8775e4d5747283dca.exe -
Executes dropped EXE 1 IoCs
pid Process 4100 09cd00d8191197b8775e4d5747283dca.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4100 09cd00d8191197b8775e4d5747283dca.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4100 09cd00d8191197b8775e4d5747283dca.exe 4100 09cd00d8191197b8775e4d5747283dca.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 936 09cd00d8191197b8775e4d5747283dca.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 936 09cd00d8191197b8775e4d5747283dca.exe 4100 09cd00d8191197b8775e4d5747283dca.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 936 wrote to memory of 4100 936 09cd00d8191197b8775e4d5747283dca.exe 95 PID 936 wrote to memory of 4100 936 09cd00d8191197b8775e4d5747283dca.exe 95 PID 936 wrote to memory of 4100 936 09cd00d8191197b8775e4d5747283dca.exe 95 PID 4100 wrote to memory of 3628 4100 09cd00d8191197b8775e4d5747283dca.exe 96 PID 4100 wrote to memory of 3628 4100 09cd00d8191197b8775e4d5747283dca.exe 96 PID 4100 wrote to memory of 3628 4100 09cd00d8191197b8775e4d5747283dca.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\09cd00d8191197b8775e4d5747283dca.exe"C:\Users\Admin\AppData\Local\Temp\09cd00d8191197b8775e4d5747283dca.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\09cd00d8191197b8775e4d5747283dca.exeC:\Users\Admin\AppData\Local\Temp\09cd00d8191197b8775e4d5747283dca.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\09cd00d8191197b8775e4d5747283dca.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3628
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5698d6234b3c8daacdf8ac2b220385495
SHA1dd32369825a8cc3d2bb2b669e3b81e60e916eef9
SHA256c6c97ccb5fc1ac1a74c4a470609665c2c1ef94f9c953826ee7ba6db38dce0bd6
SHA512849332d3665242e18ae497cbdf21e33422aceb7042bdd2db6e07a4c533ea5ce96df6b9d0f8325ee329abe5906fd3046cf2377072d637fc9a96e1de018bc94363