Analysis
-
max time kernel
178s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
2b81a3f4c872501893afd06138af23d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b81a3f4c872501893afd06138af23d1.exe
Resource
win10v2004-20231215-en
General
-
Target
2b81a3f4c872501893afd06138af23d1.exe
-
Size
1000KB
-
MD5
2b81a3f4c872501893afd06138af23d1
-
SHA1
625d334c69e5fc524570d9d5b8fe8d60db0b63db
-
SHA256
69a0caaf4d65e5d83157815fc8057a667c0e7c9da5ffb78faa556765a99db16b
-
SHA512
cc88afdcea4d5318071de6a6e38bc2bae56cade061d4e3ece03e10c471f94ebd13c3651e9eaa2cecc6c5770bb9a2e1f0096d8691c88595b584e593f192d93263
-
SSDEEP
24576:UlpZ3/64tbXNx6Fu8n1B+5vMiqt0gj2ed:wBJN0Fu8XqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1468 2b81a3f4c872501893afd06138af23d1.exe -
Executes dropped EXE 1 IoCs
pid Process 1468 2b81a3f4c872501893afd06138af23d1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1468 2b81a3f4c872501893afd06138af23d1.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1468 2b81a3f4c872501893afd06138af23d1.exe 1468 2b81a3f4c872501893afd06138af23d1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 944 2b81a3f4c872501893afd06138af23d1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 944 2b81a3f4c872501893afd06138af23d1.exe 1468 2b81a3f4c872501893afd06138af23d1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 944 wrote to memory of 1468 944 2b81a3f4c872501893afd06138af23d1.exe 89 PID 944 wrote to memory of 1468 944 2b81a3f4c872501893afd06138af23d1.exe 89 PID 944 wrote to memory of 1468 944 2b81a3f4c872501893afd06138af23d1.exe 89 PID 1468 wrote to memory of 2696 1468 2b81a3f4c872501893afd06138af23d1.exe 93 PID 1468 wrote to memory of 2696 1468 2b81a3f4c872501893afd06138af23d1.exe 93 PID 1468 wrote to memory of 2696 1468 2b81a3f4c872501893afd06138af23d1.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b81a3f4c872501893afd06138af23d1.exe"C:\Users\Admin\AppData\Local\Temp\2b81a3f4c872501893afd06138af23d1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\2b81a3f4c872501893afd06138af23d1.exeC:\Users\Admin\AppData\Local\Temp\2b81a3f4c872501893afd06138af23d1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\2b81a3f4c872501893afd06138af23d1.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD58c6c0b333f7da3d847dee510c742a22d
SHA170078114d50a3463a2be847a0012b7aeb4877a18
SHA25635068fb0a84011c8c427c0426ad81aec0dc17745acfab9ae81a95eda4de7f263
SHA51245b8023ab40ebdf89912b07e1395311eb62b5551cb980ed8fa5f2a49b619c6286aae37fcb71e5d47f0177975012e26c7190f240cc736e6f89a3b6bb33b186f68