Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
4a9f57aeca46b19c68f067be97c2eb93.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a9f57aeca46b19c68f067be97c2eb93.exe
Resource
win10v2004-20231215-en
General
-
Target
4a9f57aeca46b19c68f067be97c2eb93.exe
-
Size
1000KB
-
MD5
4a9f57aeca46b19c68f067be97c2eb93
-
SHA1
60b849d72dc99fc37668eb735d36f2d1f035b3da
-
SHA256
c7b7d00470b1dee4d7ed8e56fee2b20ea231c74b6b730f129f3d079d1b8bade5
-
SHA512
c20c5397d72bde17b11ea7fb44933660fa5a404dd495163ecf303bf03ee7edc549408f68af82857f7a4fda238ba8aa9bfa5d7cea5a7adc72dde7c6263b8950c7
-
SSDEEP
24576:VfmhmO5Zgwqe4hyC8rOEudD5xY1B+5vMiqt0gj2ed:VfmAO5ZVq14C86EudaqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 920 4a9f57aeca46b19c68f067be97c2eb93.exe -
Executes dropped EXE 1 IoCs
pid Process 920 4a9f57aeca46b19c68f067be97c2eb93.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 920 4a9f57aeca46b19c68f067be97c2eb93.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 920 4a9f57aeca46b19c68f067be97c2eb93.exe 920 4a9f57aeca46b19c68f067be97c2eb93.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 5004 4a9f57aeca46b19c68f067be97c2eb93.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 5004 4a9f57aeca46b19c68f067be97c2eb93.exe 920 4a9f57aeca46b19c68f067be97c2eb93.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5004 wrote to memory of 920 5004 4a9f57aeca46b19c68f067be97c2eb93.exe 90 PID 5004 wrote to memory of 920 5004 4a9f57aeca46b19c68f067be97c2eb93.exe 90 PID 5004 wrote to memory of 920 5004 4a9f57aeca46b19c68f067be97c2eb93.exe 90 PID 920 wrote to memory of 824 920 4a9f57aeca46b19c68f067be97c2eb93.exe 95 PID 920 wrote to memory of 824 920 4a9f57aeca46b19c68f067be97c2eb93.exe 95 PID 920 wrote to memory of 824 920 4a9f57aeca46b19c68f067be97c2eb93.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a9f57aeca46b19c68f067be97c2eb93.exe"C:\Users\Admin\AppData\Local\Temp\4a9f57aeca46b19c68f067be97c2eb93.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\4a9f57aeca46b19c68f067be97c2eb93.exeC:\Users\Admin\AppData\Local\Temp\4a9f57aeca46b19c68f067be97c2eb93.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4a9f57aeca46b19c68f067be97c2eb93.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:824
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5bad362d6c8d0315d9a490c45f6cdac9b
SHA10e800e99dc7ea7053fa5e1ac6313374aef1bbc08
SHA256b2f8c9c5d0a6168add65b5615f5fa07ca4334147de0911e3a0cd955bb976a158
SHA512ac77db0ed08f1ee4177b4d4185d819f1faafc4bde83ce0a9f287bec8a9ab9fac9e849632b254842ebdef62f2e9cbf81ab20a66c76e1fa16cb0dbf89180fe93a2