Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
1927c1eb9a37e164c5f6f28a60522c2b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1927c1eb9a37e164c5f6f28a60522c2b.exe
Resource
win10v2004-20231215-en
General
-
Target
1927c1eb9a37e164c5f6f28a60522c2b.exe
-
Size
1000KB
-
MD5
1927c1eb9a37e164c5f6f28a60522c2b
-
SHA1
502bc069bda24be2f30829b7d999d92911487dff
-
SHA256
46fa192a1d9ca55469fdb86ac31e9da1afcc3172a3ee3176e2e64e13f9fccc24
-
SHA512
61f3d819ced38d78e7e47204b68e3022835a629152e6ce912320c258c8dca3b959df6faeee8271fdead1dd0c5d184c82280d88c384d65c8a487cf7e209b23c74
-
SSDEEP
24576:EZVRW8PL1gE3eu0TgiJgxy1B+5vMiqt0gj2ed:gHRgSci2qOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1048 1927c1eb9a37e164c5f6f28a60522c2b.exe -
Executes dropped EXE 1 IoCs
pid Process 1048 1927c1eb9a37e164c5f6f28a60522c2b.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1048 1927c1eb9a37e164c5f6f28a60522c2b.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1048 1927c1eb9a37e164c5f6f28a60522c2b.exe 1048 1927c1eb9a37e164c5f6f28a60522c2b.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1656 1927c1eb9a37e164c5f6f28a60522c2b.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1656 1927c1eb9a37e164c5f6f28a60522c2b.exe 1048 1927c1eb9a37e164c5f6f28a60522c2b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1048 1656 1927c1eb9a37e164c5f6f28a60522c2b.exe 90 PID 1656 wrote to memory of 1048 1656 1927c1eb9a37e164c5f6f28a60522c2b.exe 90 PID 1656 wrote to memory of 1048 1656 1927c1eb9a37e164c5f6f28a60522c2b.exe 90 PID 1048 wrote to memory of 444 1048 1927c1eb9a37e164c5f6f28a60522c2b.exe 92 PID 1048 wrote to memory of 444 1048 1927c1eb9a37e164c5f6f28a60522c2b.exe 92 PID 1048 wrote to memory of 444 1048 1927c1eb9a37e164c5f6f28a60522c2b.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1927c1eb9a37e164c5f6f28a60522c2b.exe"C:\Users\Admin\AppData\Local\Temp\1927c1eb9a37e164c5f6f28a60522c2b.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\1927c1eb9a37e164c5f6f28a60522c2b.exeC:\Users\Admin\AppData\Local\Temp\1927c1eb9a37e164c5f6f28a60522c2b.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1927c1eb9a37e164c5f6f28a60522c2b.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5e478a9bea77d4c2028c8bb0156129612
SHA1f693caa4644c1e16cc1d5f3795beb84e31fb24e6
SHA25678014f793fa808db866590b81688219fdf5f01961462d28ba564520eac8ae959
SHA5125841da0f7d1acd6f9b97480ee0776cb15bdea6dd92a5aba788544b26390af19e1ba81c68608236d020b8cebdabeaacd5da5572ec04ae2a83ae40f665c1271c3b