Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 03:29
Static task
static1
Behavioral task
behavioral1
Sample
0cfc61c1ed000e0120ecfc5fc5e62eea.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0cfc61c1ed000e0120ecfc5fc5e62eea.exe
Resource
win10v2004-20231215-en
General
-
Target
0cfc61c1ed000e0120ecfc5fc5e62eea.exe
-
Size
506KB
-
MD5
0cfc61c1ed000e0120ecfc5fc5e62eea
-
SHA1
e70e0e8ad71514e0edc2be6e5a28076c9cc5286e
-
SHA256
78e3e353c2bec57df7fcb893e759e853a13bc53190bdc560cbbccb371937aec8
-
SHA512
53613ea1a71ca22fc2f5f4de81b044b29db1c46901fe42f673cf84d10829dc103e451766afdf9942afa96a8f07c86f6a3e2b9ef7e7d02eacbedc25c6865e3446
-
SSDEEP
12288:sPkz9/h1wzcaVVjzR+afAzAyKE8LRR+j+vpoyC:1L1zS5zCcJEcfe4FC
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2724 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2724 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 2724 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4672 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4672 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 2724 0cfc61c1ed000e0120ecfc5fc5e62eea.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4672 wrote to memory of 2724 4672 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 58 PID 4672 wrote to memory of 2724 4672 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 58 PID 4672 wrote to memory of 2724 4672 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 58 PID 2724 wrote to memory of 3084 2724 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 85 PID 2724 wrote to memory of 3084 2724 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 85 PID 2724 wrote to memory of 3084 2724 0cfc61c1ed000e0120ecfc5fc5e62eea.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exe"C:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exeC:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\0cfc61c1ed000e0120ecfc5fc5e62eea.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD55f6793a71773ff46cb7eed6fa2120ecf
SHA19ed7ffe1698f7ca532da1a324d0d7075e4081bb8
SHA256c38bff49b325ed5d4893cbf02e103d75f81284e33b02b47142f547db07151c90
SHA512fdfd638b4b4f2fac8170a5c86865aee15b66d031fdc664a0cbe3130f4ba24b4d7750574aa7e2ed7ce11c9266c63bb13ee0761877ff307c10bd31af6179e8111e