Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 08:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
13158ba939d9a5ba39667bb2b78d0287.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
13158ba939d9a5ba39667bb2b78d0287.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
13158ba939d9a5ba39667bb2b78d0287.exe
-
Size
506KB
-
MD5
13158ba939d9a5ba39667bb2b78d0287
-
SHA1
c700494eb9e1d89a7fcab0ef53a545dd0e577c4a
-
SHA256
6e105cc78c32f34a58f8aec0bdac17a2146555d65d677f36d27ab90bb112e2ae
-
SHA512
ca0f74966045ceb4bcaf41cee05629c4bbbb898cbdb9d5b03261e5e4f45e504b94c03c47fb92abc11068215fbc1ab2af2ada7980f091d08302bcf985edf571c4
-
SSDEEP
12288:Z0aJLQ9KXA+Id7bpDsweYADTCwfDYTAL+:Z0aJL4b1s1YADmqDqAC
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2432 13158ba939d9a5ba39667bb2b78d0287.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 13158ba939d9a5ba39667bb2b78d0287.exe -
Loads dropped DLL 1 IoCs
pid Process 2220 13158ba939d9a5ba39667bb2b78d0287.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2432 13158ba939d9a5ba39667bb2b78d0287.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2432 13158ba939d9a5ba39667bb2b78d0287.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 13158ba939d9a5ba39667bb2b78d0287.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2220 13158ba939d9a5ba39667bb2b78d0287.exe 2432 13158ba939d9a5ba39667bb2b78d0287.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2432 2220 13158ba939d9a5ba39667bb2b78d0287.exe 30 PID 2220 wrote to memory of 2432 2220 13158ba939d9a5ba39667bb2b78d0287.exe 30 PID 2220 wrote to memory of 2432 2220 13158ba939d9a5ba39667bb2b78d0287.exe 30 PID 2220 wrote to memory of 2432 2220 13158ba939d9a5ba39667bb2b78d0287.exe 30 PID 2432 wrote to memory of 2692 2432 13158ba939d9a5ba39667bb2b78d0287.exe 28 PID 2432 wrote to memory of 2692 2432 13158ba939d9a5ba39667bb2b78d0287.exe 28 PID 2432 wrote to memory of 2692 2432 13158ba939d9a5ba39667bb2b78d0287.exe 28 PID 2432 wrote to memory of 2692 2432 13158ba939d9a5ba39667bb2b78d0287.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exe"C:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exeC:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2432
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:2692