Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
43da4a5b49ccb925b25e60f22431240f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43da4a5b49ccb925b25e60f22431240f.exe
Resource
win10v2004-20231215-en
General
-
Target
43da4a5b49ccb925b25e60f22431240f.exe
-
Size
506KB
-
MD5
43da4a5b49ccb925b25e60f22431240f
-
SHA1
558dc8562122e1f7649ce1fd61f931de34591115
-
SHA256
4cd58ee727fe0fb78a9057c153bd197496e929ba0d635532c5fdd8c052d36907
-
SHA512
4e3d363f66bf0b1c620b0854d635e3b64c9cdbfc41efb49f33565afc1ebc6815742e983a83c924a7b9284b8a4c3e65b10f37ca6dc747f9426aac444c5904810b
-
SSDEEP
12288:GKp/JnyLvCDRvZmMQRPjI1goM/iw509IjC:NlyLWX+bI1jw091
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4740 43da4a5b49ccb925b25e60f22431240f.exe -
Executes dropped EXE 1 IoCs
pid Process 4740 43da4a5b49ccb925b25e60f22431240f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4740 43da4a5b49ccb925b25e60f22431240f.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4740 43da4a5b49ccb925b25e60f22431240f.exe 4740 43da4a5b49ccb925b25e60f22431240f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1836 43da4a5b49ccb925b25e60f22431240f.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1836 43da4a5b49ccb925b25e60f22431240f.exe 4740 43da4a5b49ccb925b25e60f22431240f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1836 wrote to memory of 4740 1836 43da4a5b49ccb925b25e60f22431240f.exe 13 PID 1836 wrote to memory of 4740 1836 43da4a5b49ccb925b25e60f22431240f.exe 13 PID 1836 wrote to memory of 4740 1836 43da4a5b49ccb925b25e60f22431240f.exe 13 PID 4740 wrote to memory of 4696 4740 43da4a5b49ccb925b25e60f22431240f.exe 18 PID 4740 wrote to memory of 4696 4740 43da4a5b49ccb925b25e60f22431240f.exe 18 PID 4740 wrote to memory of 4696 4740 43da4a5b49ccb925b25e60f22431240f.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\43da4a5b49ccb925b25e60f22431240f.exe"C:\Users\Admin\AppData\Local\Temp\43da4a5b49ccb925b25e60f22431240f.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\43da4a5b49ccb925b25e60f22431240f.exeC:\Users\Admin\AppData\Local\Temp\43da4a5b49ccb925b25e60f22431240f.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\43da4a5b49ccb925b25e60f22431240f.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5440e7674b544e24a433011a40ae6d322
SHA13c0fd99781a7a8ec65cb5c50569515ef540da558
SHA25625ad291d47593698a11d68cca30344224fbc8836d789920969d0c5badb741fd7
SHA5123d3fd8b91e053994fc3c0cad55816e12f927a309080bfad4fe02e4736692ff63d62e6b9d0951d3849f2502f353fa39c0c3337ff4f8323ddd2acfae83757330c1