Analysis
-
max time kernel
156s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
4647c7efb379555b8d5174b45830eda2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4647c7efb379555b8d5174b45830eda2.exe
Resource
win10v2004-20231215-en
General
-
Target
4647c7efb379555b8d5174b45830eda2.exe
-
Size
1000KB
-
MD5
4647c7efb379555b8d5174b45830eda2
-
SHA1
044a2cd8bf90297079b310cfbd5660ef85db8855
-
SHA256
86dcc5af9f54e8578e3b5aa2e2c772dd82df39d952600cc2255916f436d86f00
-
SHA512
42b4564535c599a759ea29bac3c45b833d57306e92d0f0abca3a0d1c09cc9eaffa9a030bad8b8bbb0965cb837f433131a6c8755cb876ce173d436abe1ca4bae6
-
SSDEEP
24576:O5i0/K2qA8TG66VTzjN7JZU1B+5vMiqt0gj2ed:O5ihhA5VfjhGqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4408 4647c7efb379555b8d5174b45830eda2.exe -
Executes dropped EXE 1 IoCs
pid Process 4408 4647c7efb379555b8d5174b45830eda2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4408 4647c7efb379555b8d5174b45830eda2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3068 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4408 4647c7efb379555b8d5174b45830eda2.exe 4408 4647c7efb379555b8d5174b45830eda2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3612 4647c7efb379555b8d5174b45830eda2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3612 4647c7efb379555b8d5174b45830eda2.exe 4408 4647c7efb379555b8d5174b45830eda2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3612 wrote to memory of 4408 3612 4647c7efb379555b8d5174b45830eda2.exe 91 PID 3612 wrote to memory of 4408 3612 4647c7efb379555b8d5174b45830eda2.exe 91 PID 3612 wrote to memory of 4408 3612 4647c7efb379555b8d5174b45830eda2.exe 91 PID 4408 wrote to memory of 3068 4408 4647c7efb379555b8d5174b45830eda2.exe 92 PID 4408 wrote to memory of 3068 4408 4647c7efb379555b8d5174b45830eda2.exe 92 PID 4408 wrote to memory of 3068 4408 4647c7efb379555b8d5174b45830eda2.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4647c7efb379555b8d5174b45830eda2.exe"C:\Users\Admin\AppData\Local\Temp\4647c7efb379555b8d5174b45830eda2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\4647c7efb379555b8d5174b45830eda2.exeC:\Users\Admin\AppData\Local\Temp\4647c7efb379555b8d5174b45830eda2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4647c7efb379555b8d5174b45830eda2.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5dbc42b6c3e7cdc463541de9de86b24a8
SHA12227b5744173ec0e81d1e7b3717e824c42a76ed5
SHA2569372c234632c68d86b290f6f7ee3c2507f7a6965036b0432d96b422fb251b132
SHA51274aa8c8e09a1a39d4894b66b51618f1d491eb2377303e70b82adb627b1f1d539c4239384134bb50b210e9a8a040bede5d5626923f00d0629ccd62d56445bdd6f