Analysis
-
max time kernel
136s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 08:11
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
13158ba939d9a5ba39667bb2b78d0287.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
13158ba939d9a5ba39667bb2b78d0287.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
13158ba939d9a5ba39667bb2b78d0287.exe
-
Size
506KB
-
MD5
13158ba939d9a5ba39667bb2b78d0287
-
SHA1
c700494eb9e1d89a7fcab0ef53a545dd0e577c4a
-
SHA256
6e105cc78c32f34a58f8aec0bdac17a2146555d65d677f36d27ab90bb112e2ae
-
SHA512
ca0f74966045ceb4bcaf41cee05629c4bbbb898cbdb9d5b03261e5e4f45e504b94c03c47fb92abc11068215fbc1ab2af2ada7980f091d08302bcf985edf571c4
-
SSDEEP
12288:Z0aJLQ9KXA+Id7bpDsweYADTCwfDYTAL+:Z0aJL4b1s1YADmqDqAC
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2036 13158ba939d9a5ba39667bb2b78d0287.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 13158ba939d9a5ba39667bb2b78d0287.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2036 13158ba939d9a5ba39667bb2b78d0287.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 13158ba939d9a5ba39667bb2b78d0287.exe 2036 13158ba939d9a5ba39667bb2b78d0287.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4232 13158ba939d9a5ba39667bb2b78d0287.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4232 13158ba939d9a5ba39667bb2b78d0287.exe 2036 13158ba939d9a5ba39667bb2b78d0287.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4232 wrote to memory of 2036 4232 13158ba939d9a5ba39667bb2b78d0287.exe 15 PID 4232 wrote to memory of 2036 4232 13158ba939d9a5ba39667bb2b78d0287.exe 15 PID 4232 wrote to memory of 2036 4232 13158ba939d9a5ba39667bb2b78d0287.exe 15 PID 2036 wrote to memory of 1340 2036 13158ba939d9a5ba39667bb2b78d0287.exe 36 PID 2036 wrote to memory of 1340 2036 13158ba939d9a5ba39667bb2b78d0287.exe 36 PID 2036 wrote to memory of 1340 2036 13158ba939d9a5ba39667bb2b78d0287.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exe"C:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exeC:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\13158ba939d9a5ba39667bb2b78d0287.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1340
-
-