Analysis
-
max time kernel
21s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
14248cc21bec3ad1f4b52c91021b9040.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14248cc21bec3ad1f4b52c91021b9040.exe
Resource
win10v2004-20231215-en
General
-
Target
14248cc21bec3ad1f4b52c91021b9040.exe
-
Size
506KB
-
MD5
14248cc21bec3ad1f4b52c91021b9040
-
SHA1
4fba65f1b0217364dc7eff69fa632723114857eb
-
SHA256
071faeb3e66b8e68776d2e3f4f4a3f639348228b4c3e4595107484a9599454c4
-
SHA512
2e67843dee10d0d510b04462078b502b523eef8cc9d1a74b9a9b9c36f3cec0294f8e425c8d7cdc925ef41feaec3b38b805f4be1e54bd6bc95dba918e418f19d0
-
SSDEEP
12288:Sj8LvFRv+3NsNyo0qltYvFNNL3fXTLUZRDQ1BtFFJBLFo7ezAwm8/4+2HDN8CceI:pLNRv+3NsNyfqeNNL3/0ZSPzFJBLFo7+
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2348 14248cc21bec3ad1f4b52c91021b9040.exe -
Executes dropped EXE 1 IoCs
pid Process 2348 14248cc21bec3ad1f4b52c91021b9040.exe -
Loads dropped DLL 1 IoCs
pid Process 1736 14248cc21bec3ad1f4b52c91021b9040.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2348 14248cc21bec3ad1f4b52c91021b9040.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2788 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 14248cc21bec3ad1f4b52c91021b9040.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1736 14248cc21bec3ad1f4b52c91021b9040.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1736 14248cc21bec3ad1f4b52c91021b9040.exe 2348 14248cc21bec3ad1f4b52c91021b9040.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2348 1736 14248cc21bec3ad1f4b52c91021b9040.exe 14 PID 1736 wrote to memory of 2348 1736 14248cc21bec3ad1f4b52c91021b9040.exe 14 PID 1736 wrote to memory of 2348 1736 14248cc21bec3ad1f4b52c91021b9040.exe 14 PID 1736 wrote to memory of 2348 1736 14248cc21bec3ad1f4b52c91021b9040.exe 14 PID 2348 wrote to memory of 2788 2348 14248cc21bec3ad1f4b52c91021b9040.exe 15 PID 2348 wrote to memory of 2788 2348 14248cc21bec3ad1f4b52c91021b9040.exe 15 PID 2348 wrote to memory of 2788 2348 14248cc21bec3ad1f4b52c91021b9040.exe 15 PID 2348 wrote to memory of 2788 2348 14248cc21bec3ad1f4b52c91021b9040.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\14248cc21bec3ad1f4b52c91021b9040.exeC:\Users\Admin\AppData\Local\Temp\14248cc21bec3ad1f4b52c91021b9040.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\14248cc21bec3ad1f4b52c91021b9040.exe" /TN Google_Trk_Updater /F2⤵
- Creates scheduled task(s)
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\14248cc21bec3ad1f4b52c91021b9040.exe"C:\Users\Admin\AppData\Local\Temp\14248cc21bec3ad1f4b52c91021b9040.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1736