Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
192b0b767de3ec0ba8604f2a41eb18cd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
192b0b767de3ec0ba8604f2a41eb18cd.exe
Resource
win10v2004-20231215-en
General
-
Target
192b0b767de3ec0ba8604f2a41eb18cd.exe
-
Size
506KB
-
MD5
192b0b767de3ec0ba8604f2a41eb18cd
-
SHA1
4f448f0f01abefc26608f972fcbddc5df144c734
-
SHA256
a4a4ff3d45d205d66d0ef40f33d48b20b218a46bde428c283305bd2425e2fa61
-
SHA512
e1aaf5499d78679037e7f13e718fe04bfe126236d6a039838320ff2b99e0a777dafa8ab77b63ea7c74cd55884bd44bebc75afdd8af05fec94b2ff4bddc63cdd7
-
SSDEEP
12288:ysW4OXxvDQvZQoODeW70GkQbuFUTzp4WD/u+3/46ufaUYP:ysXDXekbUTzuG46pd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2660 192b0b767de3ec0ba8604f2a41eb18cd.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 192b0b767de3ec0ba8604f2a41eb18cd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2660 192b0b767de3ec0ba8604f2a41eb18cd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 192b0b767de3ec0ba8604f2a41eb18cd.exe 2660 192b0b767de3ec0ba8604f2a41eb18cd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2968 192b0b767de3ec0ba8604f2a41eb18cd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2968 192b0b767de3ec0ba8604f2a41eb18cd.exe 2660 192b0b767de3ec0ba8604f2a41eb18cd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2660 2968 192b0b767de3ec0ba8604f2a41eb18cd.exe 88 PID 2968 wrote to memory of 2660 2968 192b0b767de3ec0ba8604f2a41eb18cd.exe 88 PID 2968 wrote to memory of 2660 2968 192b0b767de3ec0ba8604f2a41eb18cd.exe 88 PID 2660 wrote to memory of 3812 2660 192b0b767de3ec0ba8604f2a41eb18cd.exe 93 PID 2660 wrote to memory of 3812 2660 192b0b767de3ec0ba8604f2a41eb18cd.exe 93 PID 2660 wrote to memory of 3812 2660 192b0b767de3ec0ba8604f2a41eb18cd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\192b0b767de3ec0ba8604f2a41eb18cd.exe"C:\Users\Admin\AppData\Local\Temp\192b0b767de3ec0ba8604f2a41eb18cd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\192b0b767de3ec0ba8604f2a41eb18cd.exeC:\Users\Admin\AppData\Local\Temp\192b0b767de3ec0ba8604f2a41eb18cd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\192b0b767de3ec0ba8604f2a41eb18cd.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD59768da2803d4b7c088a2a9ac35f6b1eb
SHA1ae44d5d4829e2307874e09d2e602d0cb8dcf2c29
SHA256f69510230f0b8268d55b4f5cae5c6ab55b3e6bb7bb340e8d3d4f3781202acf0f
SHA512207b363e5e59d70d5510c1d105e7fe128091d3b7efc1e04f89ed207117eee848ae3ad61d7c5dd09b1eb9ca3ac0df341ef6bb772494b1cebc4ac40658f97ad09b