Analysis
-
max time kernel
121s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
0be10681ab131318b3f4c5eefa6dbce9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0be10681ab131318b3f4c5eefa6dbce9.exe
Resource
win10v2004-20231215-en
General
-
Target
0be10681ab131318b3f4c5eefa6dbce9.exe
-
Size
1000KB
-
MD5
0be10681ab131318b3f4c5eefa6dbce9
-
SHA1
56147d49078d8cfa60890678398a0e9eda42f246
-
SHA256
95e08107d3141a477e18982992010bf85ca3bfef067cc13e59b919048f797c7c
-
SHA512
c953f569c7f710dc7935470747ff12147556190930598ead97853897fa76365c3b8cb4e1f05673d5be0144b5b1bec44fb1a43a0de188eedb0ab16f16990f50ed
-
SSDEEP
24576:8+1PT06Fw9bAYOEYSnAPIun31B+5vMiqt0gj2ed:gz7OdH9HqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2824 0be10681ab131318b3f4c5eefa6dbce9.exe -
Executes dropped EXE 1 IoCs
pid Process 2824 0be10681ab131318b3f4c5eefa6dbce9.exe -
Loads dropped DLL 1 IoCs
pid Process 2676 0be10681ab131318b3f4c5eefa6dbce9.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2824 0be10681ab131318b3f4c5eefa6dbce9.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2824 0be10681ab131318b3f4c5eefa6dbce9.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2676 0be10681ab131318b3f4c5eefa6dbce9.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2676 0be10681ab131318b3f4c5eefa6dbce9.exe 2824 0be10681ab131318b3f4c5eefa6dbce9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2824 2676 0be10681ab131318b3f4c5eefa6dbce9.exe 27 PID 2676 wrote to memory of 2824 2676 0be10681ab131318b3f4c5eefa6dbce9.exe 27 PID 2676 wrote to memory of 2824 2676 0be10681ab131318b3f4c5eefa6dbce9.exe 27 PID 2676 wrote to memory of 2824 2676 0be10681ab131318b3f4c5eefa6dbce9.exe 27 PID 2824 wrote to memory of 2584 2824 0be10681ab131318b3f4c5eefa6dbce9.exe 30 PID 2824 wrote to memory of 2584 2824 0be10681ab131318b3f4c5eefa6dbce9.exe 30 PID 2824 wrote to memory of 2584 2824 0be10681ab131318b3f4c5eefa6dbce9.exe 30 PID 2824 wrote to memory of 2584 2824 0be10681ab131318b3f4c5eefa6dbce9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0be10681ab131318b3f4c5eefa6dbce9.exe"C:\Users\Admin\AppData\Local\Temp\0be10681ab131318b3f4c5eefa6dbce9.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\0be10681ab131318b3f4c5eefa6dbce9.exeC:\Users\Admin\AppData\Local\Temp\0be10681ab131318b3f4c5eefa6dbce9.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\0be10681ab131318b3f4c5eefa6dbce9.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD517af550306c63a61c9aa58d19a36da6a
SHA119bf13568e492a38a4a68885b2db7e2b46fc95f6
SHA256942ab4f849c8cc4acc0f9de6eb58f7dcab2eb20bc38ab44edbf324ef6f6c71d6
SHA5128bebd4d2eee5250e8a4de02ffbcb0aae70ff1b540c6b3d77944bc277d7d79dd21453120bb7a520b8929d752638d134c0fdb5e84d9a240e82572b055ae239c5b1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
144KB
MD5d6335cd101ff2c599868c56fd355dbd0
SHA162650aaf8eb40e7df3a070bb9872a04729c23ab3
SHA25695a48025f6a062b1781737c8061a7161b01e08af14b4b94c914a94b1b73267f8
SHA5129b330b8cb43a3e368cbf951f1d7ba92b3db84da1eb3bb99beb192cad79bdb2a49f1f604365fab0f5ae4799f2dcee2bef1a45a485246f02d2eb1af071ea947de1