Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
43678261400e37745ad0b5fdfb2fb5af.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
43678261400e37745ad0b5fdfb2fb5af.exe
Resource
win10v2004-20231215-en
General
-
Target
43678261400e37745ad0b5fdfb2fb5af.exe
-
Size
506KB
-
MD5
43678261400e37745ad0b5fdfb2fb5af
-
SHA1
0ef07ab188aee2d8a84836286c4b4c6322c1c4e5
-
SHA256
bfd5eb559d38051c491221d7196a6911312f9805622423a30de29f6992389f4c
-
SHA512
b5441f42605533cec5e07a60d3bcfdb46faaf3123ed15d268cd59b2c9802b162a17341d3d5f02b1930ad335d22a02ad2a88c3e65fd2669bff7ba370f33aa39f6
-
SSDEEP
12288:gRODcssnHUTTAFHYeV9hVIeEyfiwP14RT3ZZ4aWjOhGM:JcruTAFjDhVIeH4IaWlM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1048 43678261400e37745ad0b5fdfb2fb5af.exe -
Executes dropped EXE 1 IoCs
pid Process 1048 43678261400e37745ad0b5fdfb2fb5af.exe -
Loads dropped DLL 1 IoCs
pid Process 2964 43678261400e37745ad0b5fdfb2fb5af.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1048 43678261400e37745ad0b5fdfb2fb5af.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1048 43678261400e37745ad0b5fdfb2fb5af.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2964 43678261400e37745ad0b5fdfb2fb5af.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2964 43678261400e37745ad0b5fdfb2fb5af.exe 1048 43678261400e37745ad0b5fdfb2fb5af.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2964 wrote to memory of 1048 2964 43678261400e37745ad0b5fdfb2fb5af.exe 16 PID 2964 wrote to memory of 1048 2964 43678261400e37745ad0b5fdfb2fb5af.exe 16 PID 2964 wrote to memory of 1048 2964 43678261400e37745ad0b5fdfb2fb5af.exe 16 PID 2964 wrote to memory of 1048 2964 43678261400e37745ad0b5fdfb2fb5af.exe 16 PID 1048 wrote to memory of 2596 1048 43678261400e37745ad0b5fdfb2fb5af.exe 17 PID 1048 wrote to memory of 2596 1048 43678261400e37745ad0b5fdfb2fb5af.exe 17 PID 1048 wrote to memory of 2596 1048 43678261400e37745ad0b5fdfb2fb5af.exe 17 PID 1048 wrote to memory of 2596 1048 43678261400e37745ad0b5fdfb2fb5af.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\43678261400e37745ad0b5fdfb2fb5af.exe"C:\Users\Admin\AppData\Local\Temp\43678261400e37745ad0b5fdfb2fb5af.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\43678261400e37745ad0b5fdfb2fb5af.exeC:\Users\Admin\AppData\Local\Temp\43678261400e37745ad0b5fdfb2fb5af.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\43678261400e37745ad0b5fdfb2fb5af.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
115KB
MD586fed9b34ed24bb9e2960a0d3f0a35c2
SHA1a4a0120b356cefa7c837bba675265aa3cc2b9c36
SHA2567fb874cf3e9a6c19f6ad98cd04ebbe240e0b6afed736565f4a7b6c38a9378800
SHA512fdafa73761a5c845a75b9a5d65a924c8de3b5ed6c93cd4df92a12350dcf4a901f2c9fb588bbe401649efdbc410cd65398aff54d7c3f63d0b242c7ad281c9d14c
-
Filesize
45KB
MD5e4c515b6b6f07745c17a482600d1ec21
SHA17d26846115b9aea70f270aa21400cc46d84a2956
SHA256e670fca7f67d3ad9c4cfff5d928ccaec2da364fd343d5a7ac5d97524aed61c1f
SHA51207cb71ebe4ca68d2ed30e8a72353ab6644fc5e5fea07c1ae558ba5d3c5483454020ba50601fe4cd521630e6d5cb1adb4095285308655b93733462944c80155c4
-
Filesize
45KB
MD5cae17bc9c5d74e0e1142b20a7889efdb
SHA1cfea5f7d29a7dad0a1a25daf18a0cd4cb79cac86
SHA2564d74c7d252b593f92d04a5538ff5688a4ec720ab664ac723512fbcfa3f5ab691
SHA51242ba66aa767f8a15ce38f9e72990fe41e4fb2d7266e4334be0bcb7db7ac7eb38e7f3b424bb4fc5583197257e9fefc11ab19285f0881a054f338463fefb483dfd
-
Filesize
92KB
MD52f34f7b722475d0a78bf47ea7d633c5a
SHA123bc0e30f4b51fdd9fede33ea2e501132cd94e3e
SHA2568e8ca25a4cabc88e8cc917184b649445e26ea8762f24ba47ee018914fc9c8dde
SHA512757714cac173b7a48bc6cc189b01227e5c78565237449e3518d854fca01c9207255eb873085475a8cddc5562a95ec8c89996b4c31092f17b6171947b1d9be1cd