Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 05:30

General

  • Target

    2a123eee38aa6fd36b8b63c92e03b5be.exe

  • Size

    1000KB

  • MD5

    2a123eee38aa6fd36b8b63c92e03b5be

  • SHA1

    43f2b87f6d75af2f4b2250a5272de6786c2e24f4

  • SHA256

    796e8367897c482329c6dc42ef111d717313200a2a27d802c8dabb44cf631222

  • SHA512

    701a259a29155f96f71ade95329fd09bf241b44dc3f3aff0dcf34b421660d420d64b85d65721e2c0db66cdef68d5d1cc62aac19ff61cac9034b0c7025411dbf3

  • SSDEEP

    12288:SzYswHJKz2cFE0OykQOSOAvxzgNa3anUs0+e4vblMECaBwQ2tb5JLrnylUPqt0gD:xKzRp6QjB3tAFblH1B+5vMiqt0gj2ed

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe
    "C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe
      C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:4300
  • C:\Windows\SysWOW64\schtasks.exe
    schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe" /TN Google_Trk_Updater /F
    1⤵
    • Creates scheduled task(s)
    PID:4812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe

    Filesize

    92KB

    MD5

    e5da8f0a575f9dbf1f9e74cf0a0715aa

    SHA1

    10326802259f59499e4ae3cbb14d911c9db5c299

    SHA256

    586d23ed48083a521b0667aeabb11aec629764071898f397f0ebf988ea363b98

    SHA512

    7ca9845d0c9312ed9138d7499306e846c7cc082f7648e40521916f2b49c62dbc8eb7d3da2dbd7d8a3aefa8ebf0ed22cd65ae72f766267e0d90db81bf1683d479

  • memory/4300-15-0x0000000001510000-0x0000000001593000-memory.dmp

    Filesize

    524KB

  • memory/4300-21-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4300-20-0x0000000004F60000-0x0000000004FDE000-memory.dmp

    Filesize

    504KB

  • memory/4300-14-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/4300-27-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4488-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/4488-2-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/4488-1-0x0000000001510000-0x0000000001593000-memory.dmp

    Filesize

    524KB

  • memory/4488-11-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB