Analysis
-
max time kernel
181s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
495368834d37a471daee89a7ca92151a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
495368834d37a471daee89a7ca92151a.exe
Resource
win10v2004-20231215-en
General
-
Target
495368834d37a471daee89a7ca92151a.exe
-
Size
1000KB
-
MD5
495368834d37a471daee89a7ca92151a
-
SHA1
e6899579492795ff437ff7af7c488d2694bc84a6
-
SHA256
1f927dfe2b9993eff270bb149c85b82d5744872509478a7073d74487fbc2d333
-
SHA512
cda8be07fe3e1d689506fb6ec4734e0158b5805add426101638fe4175ac0124cd49f57879a6348eca6c4fd36737f723589fd96206b9354e5f32d084cdfe19770
-
SSDEEP
24576:Nrsd35WFJXG6N67g8J7EeH1B+5vMiqt0gj2ed:NO5MXtNuVJ7EiqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2012 495368834d37a471daee89a7ca92151a.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 495368834d37a471daee89a7ca92151a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2012 495368834d37a471daee89a7ca92151a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 495368834d37a471daee89a7ca92151a.exe 2012 495368834d37a471daee89a7ca92151a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 8 495368834d37a471daee89a7ca92151a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 8 495368834d37a471daee89a7ca92151a.exe 2012 495368834d37a471daee89a7ca92151a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 8 wrote to memory of 2012 8 495368834d37a471daee89a7ca92151a.exe 90 PID 8 wrote to memory of 2012 8 495368834d37a471daee89a7ca92151a.exe 90 PID 8 wrote to memory of 2012 8 495368834d37a471daee89a7ca92151a.exe 90 PID 2012 wrote to memory of 1112 2012 495368834d37a471daee89a7ca92151a.exe 93 PID 2012 wrote to memory of 1112 2012 495368834d37a471daee89a7ca92151a.exe 93 PID 2012 wrote to memory of 1112 2012 495368834d37a471daee89a7ca92151a.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\495368834d37a471daee89a7ca92151a.exe"C:\Users\Admin\AppData\Local\Temp\495368834d37a471daee89a7ca92151a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\495368834d37a471daee89a7ca92151a.exeC:\Users\Admin\AppData\Local\Temp\495368834d37a471daee89a7ca92151a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\495368834d37a471daee89a7ca92151a.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5d1385021405af52731758b36468f6b19
SHA16600d3bfa08cec27f69d254943f96bb0775ec046
SHA256497c1f9da69c5032cf57b273a52cbc09d12b15d897909bdfb0cb1be92da813e8
SHA512617de1881c492a80d1d5fe293a26da2b3707e9819fc0272e4ec1732a88d21a5955d554b0fa2c722bb801df14098d4cc3fd37c9d7d70c59c9d245d0960ddf80ee