Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:52
Static task
static1
Behavioral task
behavioral1
Sample
12aabf13c3e99e8168def452b7366025.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12aabf13c3e99e8168def452b7366025.exe
Resource
win10v2004-20231222-en
General
-
Target
12aabf13c3e99e8168def452b7366025.exe
-
Size
506KB
-
MD5
12aabf13c3e99e8168def452b7366025
-
SHA1
b8a52c4c4d8798a17106ad7b23e42c5948c8045e
-
SHA256
35e60d16d029a58157317d05b38d5d18f4f527cddd54194c02bb4dca5718efd6
-
SHA512
bda7e2c649869b2aa6df38c7e429dcabc50d668a93ddb31cbfe8a12f39aca2685552c3dfd1eeb5870e3062ae222b47f3769a9080a4cfc3225209aaea4a480687
-
SSDEEP
12288:UpJD5G7LymFz8Gorw06WkS3ltJ95BRzNcmj3rJdGljYESYnHUk:Up1mFz8TrZyIlr3BRaq3rSljY49
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3036 12aabf13c3e99e8168def452b7366025.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 12aabf13c3e99e8168def452b7366025.exe -
Loads dropped DLL 1 IoCs
pid Process 3020 12aabf13c3e99e8168def452b7366025.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3036 12aabf13c3e99e8168def452b7366025.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3036 12aabf13c3e99e8168def452b7366025.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3020 12aabf13c3e99e8168def452b7366025.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3020 12aabf13c3e99e8168def452b7366025.exe 3036 12aabf13c3e99e8168def452b7366025.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3020 wrote to memory of 3036 3020 12aabf13c3e99e8168def452b7366025.exe 28 PID 3020 wrote to memory of 3036 3020 12aabf13c3e99e8168def452b7366025.exe 28 PID 3020 wrote to memory of 3036 3020 12aabf13c3e99e8168def452b7366025.exe 28 PID 3020 wrote to memory of 3036 3020 12aabf13c3e99e8168def452b7366025.exe 28 PID 3036 wrote to memory of 2720 3036 12aabf13c3e99e8168def452b7366025.exe 30 PID 3036 wrote to memory of 2720 3036 12aabf13c3e99e8168def452b7366025.exe 30 PID 3036 wrote to memory of 2720 3036 12aabf13c3e99e8168def452b7366025.exe 30 PID 3036 wrote to memory of 2720 3036 12aabf13c3e99e8168def452b7366025.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\12aabf13c3e99e8168def452b7366025.exe"C:\Users\Admin\AppData\Local\Temp\12aabf13c3e99e8168def452b7366025.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\12aabf13c3e99e8168def452b7366025.exeC:\Users\Admin\AppData\Local\Temp\12aabf13c3e99e8168def452b7366025.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\12aabf13c3e99e8168def452b7366025.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD599e2fee5c8ad8d8cd08d7038415e2e69
SHA10dad556528790271ca4f84267229ec29117d7106
SHA256d4bfce9c96b1760b0b6201de3c208edf5e7c1ac605f1ab0f35455cfb90b5b062
SHA5120a4c3d3a2dbf35e903502d4901b0020d8062e8f473485601bdc4e2cd171ab93ec506cf34601c5bdc38efd2f5f2d32999bfd1d55b4f05fd467d5ce024cdbaa05f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
506KB
MD5611ddc9818ceba711f70d708357d7461
SHA19a64c690cdb26823e909f261666ef0489977bdde
SHA256c42f9656e60b5d865b2fc37848dae178cfa956938296aa8925b8d476f6574387
SHA51266d26a1bc979025a23660449710de0b159406bdaea19a83d8997949ea4990938f0fde7464bb245e8628cdf18c1327911f8ab6ae15625568f0eb076bbcfc10e2c