Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:37

General

  • Target

    18c1d560280a68e556c61f7a63184c27.exe

  • Size

    1000KB

  • MD5

    18c1d560280a68e556c61f7a63184c27

  • SHA1

    59154a7f91134fc5fb5c995de3d6f26e802cae1e

  • SHA256

    37169a7313530dfc48ee16eb940c7f94d4ba85a905a41b9fa1003917647a44a5

  • SHA512

    fd004e34b05013a32e0c24ed21797b9d04f198cb96160bfd83c637e5ba06e5f40adda4e8183e2b61f7d25f8a38add204b6f9db88c0fd94185f32f9731360d2e6

  • SSDEEP

    24576:w3nPUid96RVCByEiryXy04g1B+5vMiqt0gj2ed:wfUidIRVmyEiGXJqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe
    "C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe
      C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:4004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe

    Filesize

    1000KB

    MD5

    cb4f78b9e7540be2551c31bd6db6ad2c

    SHA1

    e44524849b00a65cfb866d575e291620734fef55

    SHA256

    112ec4dc396db0f7dc92ddb3b99a8d6378a661428bf865b8ac532c88576dc97f

    SHA512

    02927fe8a06b9868b2e03dc6684838d4291ade51df177bbf762c76017739acb64a458c8099511450e07fb529b36ca4b1a0b2b169621e22ffa0d0a0149a87e549

  • memory/700-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/700-1-0x0000000001510000-0x0000000001593000-memory.dmp

    Filesize

    524KB

  • memory/700-2-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/700-12-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/3276-13-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/3276-15-0x0000000001650000-0x00000000016D3000-memory.dmp

    Filesize

    524KB

  • memory/3276-21-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3276-20-0x0000000002750000-0x00000000027CE000-memory.dmp

    Filesize

    504KB

  • memory/3276-27-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB