Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
4d443884e392ce1b235c63598b1b14fd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d443884e392ce1b235c63598b1b14fd.exe
Resource
win10v2004-20231215-en
General
-
Target
4d443884e392ce1b235c63598b1b14fd.exe
-
Size
506KB
-
MD5
4d443884e392ce1b235c63598b1b14fd
-
SHA1
c6cb005d64dd656d5e0a0eb341a28c587d73041b
-
SHA256
cb2c0cc6c0c22268d63ec8f00dc6e63950306a0a76a616371414ae26394c7e7d
-
SHA512
7ebd994bab0d303cfd2cf5b06dfbc81f28dab4773b1a5cda23151fda090bbb5394215b5a258318ad1585de13aa1c15b8b747303c8b69e68f294b48c1050b8c32
-
SSDEEP
12288:YXgwIIqJ/EPvQwYYGPlo+fJ1IRDwE/kH+ZdjjK:R7IksPvQwYYGNPJ1IBLsHwjjK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4980 4d443884e392ce1b235c63598b1b14fd.exe -
Executes dropped EXE 1 IoCs
pid Process 4980 4d443884e392ce1b235c63598b1b14fd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4980 4d443884e392ce1b235c63598b1b14fd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4980 4d443884e392ce1b235c63598b1b14fd.exe 4980 4d443884e392ce1b235c63598b1b14fd.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2044 4d443884e392ce1b235c63598b1b14fd.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2044 4d443884e392ce1b235c63598b1b14fd.exe 4980 4d443884e392ce1b235c63598b1b14fd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2044 wrote to memory of 4980 2044 4d443884e392ce1b235c63598b1b14fd.exe 93 PID 2044 wrote to memory of 4980 2044 4d443884e392ce1b235c63598b1b14fd.exe 93 PID 2044 wrote to memory of 4980 2044 4d443884e392ce1b235c63598b1b14fd.exe 93 PID 4980 wrote to memory of 3668 4980 4d443884e392ce1b235c63598b1b14fd.exe 94 PID 4980 wrote to memory of 3668 4980 4d443884e392ce1b235c63598b1b14fd.exe 94 PID 4980 wrote to memory of 3668 4980 4d443884e392ce1b235c63598b1b14fd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d443884e392ce1b235c63598b1b14fd.exe"C:\Users\Admin\AppData\Local\Temp\4d443884e392ce1b235c63598b1b14fd.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\4d443884e392ce1b235c63598b1b14fd.exeC:\Users\Admin\AppData\Local\Temp\4d443884e392ce1b235c63598b1b14fd.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\4d443884e392ce1b235c63598b1b14fd.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD55383e659bc8c332b45b1057dbc3e65e1
SHA1033fabf16a571e9f2bbf1d59c5152b5881f92b8f
SHA2563a92ec1a7be606aa88fc643200b7c881608a059559a6aa5368c5f9a89c153edc
SHA5124a7bc56cab4e56361096afde2a0905c6e0cf1925302f2982194c6c33494e5e594c8db6d5a4c700909928410fd684b0128077e8ebf59f003659eacabfb49ef914