Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
47971111614b27dd1f8cf7c10fda29c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47971111614b27dd1f8cf7c10fda29c5.exe
Resource
win10v2004-20231222-en
General
-
Target
47971111614b27dd1f8cf7c10fda29c5.exe
-
Size
1000KB
-
MD5
47971111614b27dd1f8cf7c10fda29c5
-
SHA1
63cb22a1d4516f2780872e5a9f29e9a553528fb1
-
SHA256
685c29086e6070936ed0ef6e689cdb0ed564f7837abb0000653cfa0f9a31ed11
-
SHA512
3164cd32293466901d75969068a8fe1bd58943f9f08d224a2a3e51a76de3e2c344427f5e98918fedd91ab216dfb9e62001579dcd8436ebb716a723c4a5bffd93
-
SSDEEP
24576:EpxwtFIyoeK+C9jxLmpLUXQhk1B+5vMiqt0gj2ed:EpxUtoSC9jd/A8qOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1208 47971111614b27dd1f8cf7c10fda29c5.exe -
Executes dropped EXE 1 IoCs
pid Process 1208 47971111614b27dd1f8cf7c10fda29c5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1208 47971111614b27dd1f8cf7c10fda29c5.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3244 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1208 47971111614b27dd1f8cf7c10fda29c5.exe 1208 47971111614b27dd1f8cf7c10fda29c5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1840 47971111614b27dd1f8cf7c10fda29c5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1840 47971111614b27dd1f8cf7c10fda29c5.exe 1208 47971111614b27dd1f8cf7c10fda29c5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1840 wrote to memory of 1208 1840 47971111614b27dd1f8cf7c10fda29c5.exe 87 PID 1840 wrote to memory of 1208 1840 47971111614b27dd1f8cf7c10fda29c5.exe 87 PID 1840 wrote to memory of 1208 1840 47971111614b27dd1f8cf7c10fda29c5.exe 87 PID 1208 wrote to memory of 3244 1208 47971111614b27dd1f8cf7c10fda29c5.exe 90 PID 1208 wrote to memory of 3244 1208 47971111614b27dd1f8cf7c10fda29c5.exe 90 PID 1208 wrote to memory of 3244 1208 47971111614b27dd1f8cf7c10fda29c5.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\47971111614b27dd1f8cf7c10fda29c5.exe"C:\Users\Admin\AppData\Local\Temp\47971111614b27dd1f8cf7c10fda29c5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\47971111614b27dd1f8cf7c10fda29c5.exeC:\Users\Admin\AppData\Local\Temp\47971111614b27dd1f8cf7c10fda29c5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\47971111614b27dd1f8cf7c10fda29c5.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD500314b41b12612376cb90c247c72f58d
SHA1867277ee8c8741bc06bdd4545e4346f9acc70a6f
SHA2563ae0a17d09a8b5ed340e5d0270bb14433b630298a57e16abbd76eb042f7d5137
SHA512a2cd7a236318c79f01740e5d8f452d8069d878fc809216c41bec5b15416ec31bc772c8df359606b7092d15fdb60aee347577a2bc629c09b4d37e2494de5d3713