Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 04:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
453b6b0b37ee49fb346d5e04c0bfb8df.exe
Resource
win7-20231215-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
453b6b0b37ee49fb346d5e04c0bfb8df.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
453b6b0b37ee49fb346d5e04c0bfb8df.exe
-
Size
1000KB
-
MD5
453b6b0b37ee49fb346d5e04c0bfb8df
-
SHA1
efdfe8acd2a1624120c31c2412e3f598fb4ab8f4
-
SHA256
ab76c20191f2c5ccebb647e39257e809e83c5bb619497ffbb8eb2bb6eeaa57a7
-
SHA512
c40ab7c190140fbe7cfcb3f6debc055afa5c8ba183a08edec8fb829d5f084a47c89862b98922777556c6f81a6698ad5d490abe188a98f5500b64ba6a244569d0
-
SSDEEP
24576:Zh++YOo6j6DDSXnCSxb1B+5vMiqt0gj2ed:ZaL66WXCS5qOL
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4524 453b6b0b37ee49fb346d5e04c0bfb8df.exe -
Executes dropped EXE 1 IoCs
pid Process 4524 453b6b0b37ee49fb346d5e04c0bfb8df.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4524 453b6b0b37ee49fb346d5e04c0bfb8df.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3688 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4524 453b6b0b37ee49fb346d5e04c0bfb8df.exe 4524 453b6b0b37ee49fb346d5e04c0bfb8df.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4348 453b6b0b37ee49fb346d5e04c0bfb8df.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4348 453b6b0b37ee49fb346d5e04c0bfb8df.exe 4524 453b6b0b37ee49fb346d5e04c0bfb8df.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4348 wrote to memory of 4524 4348 453b6b0b37ee49fb346d5e04c0bfb8df.exe 20 PID 4348 wrote to memory of 4524 4348 453b6b0b37ee49fb346d5e04c0bfb8df.exe 20 PID 4348 wrote to memory of 4524 4348 453b6b0b37ee49fb346d5e04c0bfb8df.exe 20 PID 4524 wrote to memory of 3688 4524 453b6b0b37ee49fb346d5e04c0bfb8df.exe 19 PID 4524 wrote to memory of 3688 4524 453b6b0b37ee49fb346d5e04c0bfb8df.exe 19 PID 4524 wrote to memory of 3688 4524 453b6b0b37ee49fb346d5e04c0bfb8df.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\453b6b0b37ee49fb346d5e04c0bfb8df.exe"C:\Users\Admin\AppData\Local\Temp\453b6b0b37ee49fb346d5e04c0bfb8df.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\453b6b0b37ee49fb346d5e04c0bfb8df.exeC:\Users\Admin\AppData\Local\Temp\453b6b0b37ee49fb346d5e04c0bfb8df.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4524
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\453b6b0b37ee49fb346d5e04c0bfb8df.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:3688