Analysis
-
max time kernel
174s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
517781cef58e0628c22e72e35e6323b2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
517781cef58e0628c22e72e35e6323b2.exe
Resource
win10v2004-20231215-en
General
-
Target
517781cef58e0628c22e72e35e6323b2.exe
-
Size
506KB
-
MD5
517781cef58e0628c22e72e35e6323b2
-
SHA1
f4e7b34e329a059aef419927a03dbdc9b356eb6c
-
SHA256
307e2b4bc47e8e97fb7540f31a8c1d77262553415786bfacf42a0b642c7f2068
-
SHA512
803fb52773af419abf36bd2d542561afa089056d16d83e10ae12ee37e9c40e935fcf4bdbaf9ad0cdeaa2aff1f888327890623fc3d7a0dd43f704db6519a0cafa
-
SSDEEP
12288:VB8HD97TZ6i2jUgGa+BRWZvPMCbBZFklSpZ:HGH6iV3BRMvPMCb5klSpZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5072 517781cef58e0628c22e72e35e6323b2.exe -
Executes dropped EXE 1 IoCs
pid Process 5072 517781cef58e0628c22e72e35e6323b2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5072 517781cef58e0628c22e72e35e6323b2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5072 517781cef58e0628c22e72e35e6323b2.exe 5072 517781cef58e0628c22e72e35e6323b2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4808 517781cef58e0628c22e72e35e6323b2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4808 517781cef58e0628c22e72e35e6323b2.exe 5072 517781cef58e0628c22e72e35e6323b2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4808 wrote to memory of 5072 4808 517781cef58e0628c22e72e35e6323b2.exe 91 PID 4808 wrote to memory of 5072 4808 517781cef58e0628c22e72e35e6323b2.exe 91 PID 4808 wrote to memory of 5072 4808 517781cef58e0628c22e72e35e6323b2.exe 91 PID 5072 wrote to memory of 4232 5072 517781cef58e0628c22e72e35e6323b2.exe 92 PID 5072 wrote to memory of 4232 5072 517781cef58e0628c22e72e35e6323b2.exe 92 PID 5072 wrote to memory of 4232 5072 517781cef58e0628c22e72e35e6323b2.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\517781cef58e0628c22e72e35e6323b2.exe"C:\Users\Admin\AppData\Local\Temp\517781cef58e0628c22e72e35e6323b2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\517781cef58e0628c22e72e35e6323b2.exeC:\Users\Admin\AppData\Local\Temp\517781cef58e0628c22e72e35e6323b2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\517781cef58e0628c22e72e35e6323b2.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4232
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD50fe1c8b0d61538f8a9cb5f0b534305ef
SHA1d8999d4f5e7360781f4129a7b32fa4127e452844
SHA256947987660f352e51988556ed6f6347a15de91b0bb0011601de37fd17e8f4288a
SHA51268574949648a82e56dc38214bc8bddfa4dfac388b095b73201ec5419102c19a2aa314bb8a4990ef626fe00800bc9f371e20d3ae61c231c16f9151b31dadb7f2d