Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:37
Static task
static1
Behavioral task
behavioral1
Sample
18c1d560280a68e556c61f7a63184c27.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18c1d560280a68e556c61f7a63184c27.exe
Resource
win10v2004-20231215-en
General
-
Target
18c1d560280a68e556c61f7a63184c27.exe
-
Size
1000KB
-
MD5
18c1d560280a68e556c61f7a63184c27
-
SHA1
59154a7f91134fc5fb5c995de3d6f26e802cae1e
-
SHA256
37169a7313530dfc48ee16eb940c7f94d4ba85a905a41b9fa1003917647a44a5
-
SHA512
fd004e34b05013a32e0c24ed21797b9d04f198cb96160bfd83c637e5ba06e5f40adda4e8183e2b61f7d25f8a38add204b6f9db88c0fd94185f32f9731360d2e6
-
SSDEEP
24576:w3nPUid96RVCByEiryXy04g1B+5vMiqt0gj2ed:wfUidIRVmyEiGXJqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3276 18c1d560280a68e556c61f7a63184c27.exe -
Executes dropped EXE 1 IoCs
pid Process 3276 18c1d560280a68e556c61f7a63184c27.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3276 18c1d560280a68e556c61f7a63184c27.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3276 18c1d560280a68e556c61f7a63184c27.exe 3276 18c1d560280a68e556c61f7a63184c27.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 700 18c1d560280a68e556c61f7a63184c27.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 700 18c1d560280a68e556c61f7a63184c27.exe 3276 18c1d560280a68e556c61f7a63184c27.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 700 wrote to memory of 3276 700 18c1d560280a68e556c61f7a63184c27.exe 89 PID 700 wrote to memory of 3276 700 18c1d560280a68e556c61f7a63184c27.exe 89 PID 700 wrote to memory of 3276 700 18c1d560280a68e556c61f7a63184c27.exe 89 PID 3276 wrote to memory of 4004 3276 18c1d560280a68e556c61f7a63184c27.exe 92 PID 3276 wrote to memory of 4004 3276 18c1d560280a68e556c61f7a63184c27.exe 92 PID 3276 wrote to memory of 4004 3276 18c1d560280a68e556c61f7a63184c27.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe"C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exeC:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\18c1d560280a68e556c61f7a63184c27.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4004
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5cb4f78b9e7540be2551c31bd6db6ad2c
SHA1e44524849b00a65cfb866d575e291620734fef55
SHA256112ec4dc396db0f7dc92ddb3b99a8d6378a661428bf865b8ac532c88576dc97f
SHA51202927fe8a06b9868b2e03dc6684838d4291ade51df177bbf762c76017739acb64a458c8099511450e07fb529b36ca4b1a0b2b169621e22ffa0d0a0149a87e549