Analysis
-
max time kernel
152s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
57279e3e920a97e8f5bd8c5d87e620e0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57279e3e920a97e8f5bd8c5d87e620e0.exe
Resource
win10v2004-20231215-en
General
-
Target
57279e3e920a97e8f5bd8c5d87e620e0.exe
-
Size
506KB
-
MD5
57279e3e920a97e8f5bd8c5d87e620e0
-
SHA1
13c4f200be0e82649d65c2beb5e277863e0d7c00
-
SHA256
1a5ae6ade204b8938f75c0de544cd29800466e5f217689c5154cba1f779784bd
-
SHA512
57dd51d2149af9f7cf6659c3d87223e03dbd27e37250e0528cc2b64edfdec4f3e5b4a452fb6db82dfa2ad0051809c329e48026c107ad49c62642d4aaf3249875
-
SSDEEP
12288:4TKi/zRbB6NL9vsDLCXX7OvVacooR+63LBg:4TKERENhiL0XyvVaOfS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4360 57279e3e920a97e8f5bd8c5d87e620e0.exe -
Executes dropped EXE 1 IoCs
pid Process 4360 57279e3e920a97e8f5bd8c5d87e620e0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4360 57279e3e920a97e8f5bd8c5d87e620e0.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4360 57279e3e920a97e8f5bd8c5d87e620e0.exe 4360 57279e3e920a97e8f5bd8c5d87e620e0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4064 57279e3e920a97e8f5bd8c5d87e620e0.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4064 57279e3e920a97e8f5bd8c5d87e620e0.exe 4360 57279e3e920a97e8f5bd8c5d87e620e0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4064 wrote to memory of 4360 4064 57279e3e920a97e8f5bd8c5d87e620e0.exe 93 PID 4064 wrote to memory of 4360 4064 57279e3e920a97e8f5bd8c5d87e620e0.exe 93 PID 4064 wrote to memory of 4360 4064 57279e3e920a97e8f5bd8c5d87e620e0.exe 93 PID 4360 wrote to memory of 5072 4360 57279e3e920a97e8f5bd8c5d87e620e0.exe 94 PID 4360 wrote to memory of 5072 4360 57279e3e920a97e8f5bd8c5d87e620e0.exe 94 PID 4360 wrote to memory of 5072 4360 57279e3e920a97e8f5bd8c5d87e620e0.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\57279e3e920a97e8f5bd8c5d87e620e0.exe"C:\Users\Admin\AppData\Local\Temp\57279e3e920a97e8f5bd8c5d87e620e0.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\57279e3e920a97e8f5bd8c5d87e620e0.exeC:\Users\Admin\AppData\Local\Temp\57279e3e920a97e8f5bd8c5d87e620e0.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\57279e3e920a97e8f5bd8c5d87e620e0.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:5072
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5f38f4792d98bd6491ee404577aca9f39
SHA1a1c294ab9a539b01258b026fe33d492253d7620f
SHA256ce9cb508fc0858f4a60357132ca1c80d5bbcac08940b5ea9aeacd9f536a74e3d
SHA512b19eb2cfa295a28a0a5ec76c5009994869da0fc7f6184546ed615d67cbb866df279da7803661e8da1ced4f791984a3fc7bb4aa920a97c18cd66ab91cf2e7847a