Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
4cfd237a6ffd85fb041b647d6f91371e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cfd237a6ffd85fb041b647d6f91371e.exe
Resource
win10v2004-20231215-en
General
-
Target
4cfd237a6ffd85fb041b647d6f91371e.exe
-
Size
855KB
-
MD5
4cfd237a6ffd85fb041b647d6f91371e
-
SHA1
fabc1fc05e5f1cc3b64cd93c7e4da084693fb186
-
SHA256
f7d65ca5f001f1aa91cb78721000edfdad981d31128000d627240e9d14731b99
-
SHA512
f44853e18ea7ee0af8cf6cf7581a01f76618b68a49a1472da02e1d0f752afa48c30eb168ff9b878a9f65c798e3258f475840227ca1f54d6656efc9eb4596c3f2
-
SSDEEP
12288:lXueCFMXQ94t0sOzpf9rg6Q4wSkJd0+yTW+v80D3Fo2F8IECaBwQ2tb5JLrnylU6:lXuhOSsed9ESh+uRd7FocU1B+5vMiqx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1896 4cfd237a6ffd85fb041b647d6f91371e.exe -
Executes dropped EXE 1 IoCs
pid Process 1896 4cfd237a6ffd85fb041b647d6f91371e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1896 4cfd237a6ffd85fb041b647d6f91371e.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1896 4cfd237a6ffd85fb041b647d6f91371e.exe 1896 4cfd237a6ffd85fb041b647d6f91371e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2924 4cfd237a6ffd85fb041b647d6f91371e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2924 4cfd237a6ffd85fb041b647d6f91371e.exe 1896 4cfd237a6ffd85fb041b647d6f91371e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1896 2924 4cfd237a6ffd85fb041b647d6f91371e.exe 85 PID 2924 wrote to memory of 1896 2924 4cfd237a6ffd85fb041b647d6f91371e.exe 85 PID 2924 wrote to memory of 1896 2924 4cfd237a6ffd85fb041b647d6f91371e.exe 85 PID 1896 wrote to memory of 5096 1896 4cfd237a6ffd85fb041b647d6f91371e.exe 93 PID 1896 wrote to memory of 5096 1896 4cfd237a6ffd85fb041b647d6f91371e.exe 93 PID 1896 wrote to memory of 5096 1896 4cfd237a6ffd85fb041b647d6f91371e.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cfd237a6ffd85fb041b647d6f91371e.exe"C:\Users\Admin\AppData\Local\Temp\4cfd237a6ffd85fb041b647d6f91371e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\4cfd237a6ffd85fb041b647d6f91371e.exeC:\Users\Admin\AppData\Local\Temp\4cfd237a6ffd85fb041b647d6f91371e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4cfd237a6ffd85fb041b647d6f91371e.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:5096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5870afd4ec2c2c820cb7d788990c06b8b
SHA10a930925b24da285cc1919f08273d07c5872d23e
SHA256d285c73a1a05a9765191fb3f0141d5a5dfa24054cc6d214f0ea170b96a80f4a2
SHA5126e25807a751333fa2c17134cbc221c1efa0cde7bc6366d659b320f9b2b7806dcbe86ed1319c81a3e62ab40179a7e94242b9572a9f9dc2f06564d598d6a0afd54