Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
1c4c2ef0ebfce91023cae5c079962d50.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c4c2ef0ebfce91023cae5c079962d50.exe
Resource
win10v2004-20231215-en
General
-
Target
1c4c2ef0ebfce91023cae5c079962d50.exe
-
Size
1012KB
-
MD5
1c4c2ef0ebfce91023cae5c079962d50
-
SHA1
ae66f3209c800ba92e8a084a1c71fc2ea88810df
-
SHA256
edf2003a34d34229128d7381770db6e1e1e81385eea1fae16f5ce590ecb9432d
-
SHA512
f972cb7bcfbaa5a031f3cf64bbfcbe1594385380d1c230ba32d5e3475b3428e2d6a655790e0e19e7199458728bfe7bd282ace838f47f2d4974a5069da7509a68
-
SSDEEP
12288:6ubCM6ZF9mWArrB5z5tfzF9KLXRphLpECaBwQ2tb5JLrnylUPqt0gHDS7eyoR:6uCPUrPB/D9EXhm1B+5vMiqt0gj2eR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2388 1c4c2ef0ebfce91023cae5c079962d50.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 1c4c2ef0ebfce91023cae5c079962d50.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2388 1c4c2ef0ebfce91023cae5c079962d50.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4780 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2388 1c4c2ef0ebfce91023cae5c079962d50.exe 2388 1c4c2ef0ebfce91023cae5c079962d50.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4888 1c4c2ef0ebfce91023cae5c079962d50.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4888 1c4c2ef0ebfce91023cae5c079962d50.exe 2388 1c4c2ef0ebfce91023cae5c079962d50.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4888 wrote to memory of 2388 4888 1c4c2ef0ebfce91023cae5c079962d50.exe 19 PID 4888 wrote to memory of 2388 4888 1c4c2ef0ebfce91023cae5c079962d50.exe 19 PID 4888 wrote to memory of 2388 4888 1c4c2ef0ebfce91023cae5c079962d50.exe 19 PID 2388 wrote to memory of 4780 2388 1c4c2ef0ebfce91023cae5c079962d50.exe 65 PID 2388 wrote to memory of 4780 2388 1c4c2ef0ebfce91023cae5c079962d50.exe 65 PID 2388 wrote to memory of 4780 2388 1c4c2ef0ebfce91023cae5c079962d50.exe 65
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c4c2ef0ebfce91023cae5c079962d50.exe"C:\Users\Admin\AppData\Local\Temp\1c4c2ef0ebfce91023cae5c079962d50.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\1c4c2ef0ebfce91023cae5c079962d50.exeC:\Users\Admin\AppData\Local\Temp\1c4c2ef0ebfce91023cae5c079962d50.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\1c4c2ef0ebfce91023cae5c079962d50.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4780
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1012KB
MD56fca7e641775e3ed56ebb4b5f73d7351
SHA1924fa3fa2cc7f86064675dd46b0b77689cc13513
SHA256c8b5574ea94648c936b0beff061d7d8b2f3cf04fdf52fde4405c3d2fb5f841f6
SHA5129b0a4af5cc7cc4ad7c196b6c00ca6f2823941dca4f25494fcd511fa64eee8f0ff0dc7a849957bc8ef757761e83075aecdadd1b8a2abfdd03708fbc9e2551497a