Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 14:16
Static task
static1
Behavioral task
behavioral1
Sample
1b25806e73932bfb214bad72a89e78b5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1b25806e73932bfb214bad72a89e78b5.exe
Resource
win10v2004-20231215-en
General
-
Target
1b25806e73932bfb214bad72a89e78b5.exe
-
Size
1000KB
-
MD5
1b25806e73932bfb214bad72a89e78b5
-
SHA1
948db5eb6f44746e74b664e01df075a1bae20635
-
SHA256
3fed12732faa97a6eb567f450a72d816dd91e22af019915576c44815e2b33f39
-
SHA512
5801e9a59a5e6b51d47972750db697130e91770070f70ded37c765c31ea30dc592622ebd87248f856c514d0f08f97163f41380cd96b5d4106340006306067ee2
-
SSDEEP
24576:enXDx89O22BG7EsZWXJgOgzG1B+5vMiqt0gj2ed:eYYSEstkqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2828 1b25806e73932bfb214bad72a89e78b5.exe -
Executes dropped EXE 1 IoCs
pid Process 2828 1b25806e73932bfb214bad72a89e78b5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2828 1b25806e73932bfb214bad72a89e78b5.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2828 1b25806e73932bfb214bad72a89e78b5.exe 2828 1b25806e73932bfb214bad72a89e78b5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1752 1b25806e73932bfb214bad72a89e78b5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1752 1b25806e73932bfb214bad72a89e78b5.exe 2828 1b25806e73932bfb214bad72a89e78b5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2828 1752 1b25806e73932bfb214bad72a89e78b5.exe 90 PID 1752 wrote to memory of 2828 1752 1b25806e73932bfb214bad72a89e78b5.exe 90 PID 1752 wrote to memory of 2828 1752 1b25806e73932bfb214bad72a89e78b5.exe 90 PID 2828 wrote to memory of 4088 2828 1b25806e73932bfb214bad72a89e78b5.exe 91 PID 2828 wrote to memory of 4088 2828 1b25806e73932bfb214bad72a89e78b5.exe 91 PID 2828 wrote to memory of 4088 2828 1b25806e73932bfb214bad72a89e78b5.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b25806e73932bfb214bad72a89e78b5.exe"C:\Users\Admin\AppData\Local\Temp\1b25806e73932bfb214bad72a89e78b5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\1b25806e73932bfb214bad72a89e78b5.exeC:\Users\Admin\AppData\Local\Temp\1b25806e73932bfb214bad72a89e78b5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1b25806e73932bfb214bad72a89e78b5.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4088
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD53628122cc739b40fd97f611513614258
SHA18829c689182a374aeb29c0e3d7752b3d1ee16465
SHA2560740450fa2efe675be8bd4b71567037128049f9bbd580a819e0c392530a664ad
SHA512f49449888d3b1a69b7e3952d0f000b9cc2e7f5a4b5252b30b97d6b2aa6abdee0437117d52a70b3c9ad1d5f37de941d814e8cd3d06268a94a9baeb18617be4bdd