Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
5302b325f5239280c8778b320b6d35d6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5302b325f5239280c8778b320b6d35d6.exe
Resource
win10v2004-20231222-en
General
-
Target
5302b325f5239280c8778b320b6d35d6.exe
-
Size
506KB
-
MD5
5302b325f5239280c8778b320b6d35d6
-
SHA1
be3f18bfb2cbbf44449c1e3d698168edcdd507e4
-
SHA256
5c52617ca781972992573e275c2683370534f49410be7dc9f09182b82aeabaaf
-
SHA512
71099e9be4862fa65959613d79f6c2c72e39ddda498cd9a8be71db73393678c0234183c21068c5492a0229b2ea2e5cc585d040f5368ae63f04cf18b36d7d27bd
-
SSDEEP
12288:hsIiS2pHnAUDJfcHNO4+6qfW4UPA+8pU6V0IsGnG3SKidJkvfx:eRP6HNO4+XfsA+8pUw0IW3tidJgx
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2944 5302b325f5239280c8778b320b6d35d6.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 5302b325f5239280c8778b320b6d35d6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2944 5302b325f5239280c8778b320b6d35d6.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2944 5302b325f5239280c8778b320b6d35d6.exe 2944 5302b325f5239280c8778b320b6d35d6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2236 5302b325f5239280c8778b320b6d35d6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2236 5302b325f5239280c8778b320b6d35d6.exe 2944 5302b325f5239280c8778b320b6d35d6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2944 2236 5302b325f5239280c8778b320b6d35d6.exe 95 PID 2236 wrote to memory of 2944 2236 5302b325f5239280c8778b320b6d35d6.exe 95 PID 2236 wrote to memory of 2944 2236 5302b325f5239280c8778b320b6d35d6.exe 95 PID 2944 wrote to memory of 732 2944 5302b325f5239280c8778b320b6d35d6.exe 93 PID 2944 wrote to memory of 732 2944 5302b325f5239280c8778b320b6d35d6.exe 93 PID 2944 wrote to memory of 732 2944 5302b325f5239280c8778b320b6d35d6.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5302b325f5239280c8778b320b6d35d6.exe"C:\Users\Admin\AppData\Local\Temp\5302b325f5239280c8778b320b6d35d6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\5302b325f5239280c8778b320b6d35d6.exeC:\Users\Admin\AppData\Local\Temp\5302b325f5239280c8778b320b6d35d6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2944
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\5302b325f5239280c8778b320b6d35d6.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD58fe066eb5fbe3764901ca97e011e0e10
SHA1eb8e5e121b2b61d1b9efac8b3a2fb8f9173b27bd
SHA25698f99b964beada9bbd85481a82fa8378f3e1321c57068e82f208ddc397056dc2
SHA5125373b1fffcebfec32f388f515ce15507089da83b46acf7ef2f986473d9e28c200450076b0b4407e1b411b14a7ebcfaa38d8739628852932a15ced757677d7607