Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:30
Static task
static1
Behavioral task
behavioral1
Sample
2a123eee38aa6fd36b8b63c92e03b5be.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2a123eee38aa6fd36b8b63c92e03b5be.exe
Resource
win10v2004-20231222-en
General
-
Target
2a123eee38aa6fd36b8b63c92e03b5be.exe
-
Size
1000KB
-
MD5
2a123eee38aa6fd36b8b63c92e03b5be
-
SHA1
43f2b87f6d75af2f4b2250a5272de6786c2e24f4
-
SHA256
796e8367897c482329c6dc42ef111d717313200a2a27d802c8dabb44cf631222
-
SHA512
701a259a29155f96f71ade95329fd09bf241b44dc3f3aff0dcf34b421660d420d64b85d65721e2c0db66cdef68d5d1cc62aac19ff61cac9034b0c7025411dbf3
-
SSDEEP
12288:SzYswHJKz2cFE0OykQOSOAvxzgNa3anUs0+e4vblMECaBwQ2tb5JLrnylUPqt0gD:xKzRp6QjB3tAFblH1B+5vMiqt0gj2ed
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4300 2a123eee38aa6fd36b8b63c92e03b5be.exe -
Executes dropped EXE 1 IoCs
pid Process 4300 2a123eee38aa6fd36b8b63c92e03b5be.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4300 2a123eee38aa6fd36b8b63c92e03b5be.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4812 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4300 2a123eee38aa6fd36b8b63c92e03b5be.exe 4300 2a123eee38aa6fd36b8b63c92e03b5be.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4488 2a123eee38aa6fd36b8b63c92e03b5be.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4488 2a123eee38aa6fd36b8b63c92e03b5be.exe 4300 2a123eee38aa6fd36b8b63c92e03b5be.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4488 wrote to memory of 4300 4488 2a123eee38aa6fd36b8b63c92e03b5be.exe 20 PID 4488 wrote to memory of 4300 4488 2a123eee38aa6fd36b8b63c92e03b5be.exe 20 PID 4488 wrote to memory of 4300 4488 2a123eee38aa6fd36b8b63c92e03b5be.exe 20 PID 4300 wrote to memory of 4812 4300 2a123eee38aa6fd36b8b63c92e03b5be.exe 19 PID 4300 wrote to memory of 4812 4300 2a123eee38aa6fd36b8b63c92e03b5be.exe 19 PID 4300 wrote to memory of 4812 4300 2a123eee38aa6fd36b8b63c92e03b5be.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe"C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exeC:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4300
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\2a123eee38aa6fd36b8b63c92e03b5be.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5e5da8f0a575f9dbf1f9e74cf0a0715aa
SHA110326802259f59499e4ae3cbb14d911c9db5c299
SHA256586d23ed48083a521b0667aeabb11aec629764071898f397f0ebf988ea363b98
SHA5127ca9845d0c9312ed9138d7499306e846c7cc082f7648e40521916f2b49c62dbc8eb7d3da2dbd7d8a3aefa8ebf0ed22cd65ae72f766267e0d90db81bf1683d479