Analysis
-
max time kernel
137s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
22b7909298c4e5d9a18055e3b1c66e62.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22b7909298c4e5d9a18055e3b1c66e62.exe
Resource
win10v2004-20231215-en
General
-
Target
22b7909298c4e5d9a18055e3b1c66e62.exe
-
Size
506KB
-
MD5
22b7909298c4e5d9a18055e3b1c66e62
-
SHA1
da9a3ab62f8bb89ae0cf924081b328315d33d0f9
-
SHA256
45b9e6e8b0de0313d76e5765fc0e3cc2bb0f873e7c6c2e13e59aa81c06353469
-
SHA512
36d43094ad1135eb40a958b459cb09d56bd0bfc269c94032289bc1b948d09d12d6bb2e5dc9f77733998017b5f7137ddf88161507dbea213c202b9e07609e5d11
-
SSDEEP
6144:UFDRlD2QwHZr2PJBXTeNhrOvFcW+tKLhnGXY2sxYbjpMfiSLLb858+0iIL2co:U7IQ+URBSfrW3+twpGovYS7Ln82TBo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4392 22b7909298c4e5d9a18055e3b1c66e62.exe -
Executes dropped EXE 1 IoCs
pid Process 4392 22b7909298c4e5d9a18055e3b1c66e62.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4392 22b7909298c4e5d9a18055e3b1c66e62.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4856 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4392 22b7909298c4e5d9a18055e3b1c66e62.exe 4392 22b7909298c4e5d9a18055e3b1c66e62.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3472 22b7909298c4e5d9a18055e3b1c66e62.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3472 22b7909298c4e5d9a18055e3b1c66e62.exe 4392 22b7909298c4e5d9a18055e3b1c66e62.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3472 wrote to memory of 4392 3472 22b7909298c4e5d9a18055e3b1c66e62.exe 93 PID 3472 wrote to memory of 4392 3472 22b7909298c4e5d9a18055e3b1c66e62.exe 93 PID 3472 wrote to memory of 4392 3472 22b7909298c4e5d9a18055e3b1c66e62.exe 93 PID 4392 wrote to memory of 4856 4392 22b7909298c4e5d9a18055e3b1c66e62.exe 94 PID 4392 wrote to memory of 4856 4392 22b7909298c4e5d9a18055e3b1c66e62.exe 94 PID 4392 wrote to memory of 4856 4392 22b7909298c4e5d9a18055e3b1c66e62.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\22b7909298c4e5d9a18055e3b1c66e62.exe"C:\Users\Admin\AppData\Local\Temp\22b7909298c4e5d9a18055e3b1c66e62.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\22b7909298c4e5d9a18055e3b1c66e62.exeC:\Users\Admin\AppData\Local\Temp\22b7909298c4e5d9a18055e3b1c66e62.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\22b7909298c4e5d9a18055e3b1c66e62.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5e40a1897da867236ccea9a99d1667eb3
SHA1aa7e9fdaf2276fe0f219b72db565e751351e99dd
SHA2561129f24840b34f08bbfcc3b12f922809093224889ffa8823c34adda9cd4758c3
SHA51203fced9c386747f72c43970c88e45eb6a9a863e9dabc6c37e2a9d1d572218ae7e0839c14b630a67dddf2b74f28410fae88d863ec6d767c190082d8ece5fe785e