Analysis
-
max time kernel
149s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:38
Static task
static1
Behavioral task
behavioral1
Sample
21ff693f095c98dc1a0936c9858402c5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
21ff693f095c98dc1a0936c9858402c5.exe
Resource
win10v2004-20231215-en
General
-
Target
21ff693f095c98dc1a0936c9858402c5.exe
-
Size
1000KB
-
MD5
21ff693f095c98dc1a0936c9858402c5
-
SHA1
1e167ea1210d5adf5e546d0986bbe4dcfadc6a01
-
SHA256
3ec6fdbf96cc8de24ffb38e31c0205e57eae34d3e83273b5e4dcaceca23bc700
-
SHA512
4be807e9c7db5cece50e8b834921a73a2af996acd0495b52560a89b54927fef9c956adb17cf966918e23bc23a2ffe8b6dfc108415d9391c2aa859656a8028410
-
SSDEEP
12288:2LxGCUjiXfuM63fy8hcVbWZ6QDSHbsmBtECaBwQ2tb5JLrnylUPqt0gHDS7eyod:2LxGvCf+fEVSXc1BG1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2696 21ff693f095c98dc1a0936c9858402c5.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 21ff693f095c98dc1a0936c9858402c5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2696 21ff693f095c98dc1a0936c9858402c5.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4044 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2696 21ff693f095c98dc1a0936c9858402c5.exe 2696 21ff693f095c98dc1a0936c9858402c5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2568 21ff693f095c98dc1a0936c9858402c5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2568 21ff693f095c98dc1a0936c9858402c5.exe 2696 21ff693f095c98dc1a0936c9858402c5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2696 2568 21ff693f095c98dc1a0936c9858402c5.exe 90 PID 2568 wrote to memory of 2696 2568 21ff693f095c98dc1a0936c9858402c5.exe 90 PID 2568 wrote to memory of 2696 2568 21ff693f095c98dc1a0936c9858402c5.exe 90 PID 2696 wrote to memory of 4044 2696 21ff693f095c98dc1a0936c9858402c5.exe 93 PID 2696 wrote to memory of 4044 2696 21ff693f095c98dc1a0936c9858402c5.exe 93 PID 2696 wrote to memory of 4044 2696 21ff693f095c98dc1a0936c9858402c5.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\21ff693f095c98dc1a0936c9858402c5.exe"C:\Users\Admin\AppData\Local\Temp\21ff693f095c98dc1a0936c9858402c5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\21ff693f095c98dc1a0936c9858402c5.exeC:\Users\Admin\AppData\Local\Temp\21ff693f095c98dc1a0936c9858402c5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\21ff693f095c98dc1a0936c9858402c5.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5cba7cdd23561589a1f50db5f15af3229
SHA1d1e500ccb20171a01a1826e0d5bfad454d8801cb
SHA256c1ae1812713cb2b66b4e26486591797558acc0a8d4d419b181610d19933c40f7
SHA5126f083806a957d1c01503815a2f5263d3f7ef173283b40e4108669293bb5900396b7f4a65748ae8a3fb28911f8add3c7ba84bba68ec56ab6ad1f7b7f583ab8db8