Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
59b97db7d19fc17dd9d8da411473aa07.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
59b97db7d19fc17dd9d8da411473aa07.exe
Resource
win10v2004-20231215-en
General
-
Target
59b97db7d19fc17dd9d8da411473aa07.exe
-
Size
506KB
-
MD5
59b97db7d19fc17dd9d8da411473aa07
-
SHA1
8de3d8f1346cb254b1d9c204dba5cbb38add5b89
-
SHA256
ca35391754e4d9f72f5b1652643bc0e61cfba25e27e2dca9d8b1aaca3fe1f5d0
-
SHA512
419294634efc326ee7f8843c8736630cf022a0883083b88927e0abb7c9dfe1bba0d13264eb6210825aca6ceef8ba5c44e4b2657656084a86544c84ee29260e9d
-
SSDEEP
12288:ClEDaUAhWbCTfC56s5w04I8VpcuY7aD3IQtpgVFKV5Q/:CcaYbCLQN2bDzSJ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1084 59b97db7d19fc17dd9d8da411473aa07.exe -
Executes dropped EXE 1 IoCs
pid Process 1084 59b97db7d19fc17dd9d8da411473aa07.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1084 59b97db7d19fc17dd9d8da411473aa07.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3920 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1084 59b97db7d19fc17dd9d8da411473aa07.exe 1084 59b97db7d19fc17dd9d8da411473aa07.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2272 59b97db7d19fc17dd9d8da411473aa07.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2272 59b97db7d19fc17dd9d8da411473aa07.exe 1084 59b97db7d19fc17dd9d8da411473aa07.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2272 wrote to memory of 1084 2272 59b97db7d19fc17dd9d8da411473aa07.exe 88 PID 2272 wrote to memory of 1084 2272 59b97db7d19fc17dd9d8da411473aa07.exe 88 PID 2272 wrote to memory of 1084 2272 59b97db7d19fc17dd9d8da411473aa07.exe 88 PID 1084 wrote to memory of 3920 1084 59b97db7d19fc17dd9d8da411473aa07.exe 91 PID 1084 wrote to memory of 3920 1084 59b97db7d19fc17dd9d8da411473aa07.exe 91 PID 1084 wrote to memory of 3920 1084 59b97db7d19fc17dd9d8da411473aa07.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\59b97db7d19fc17dd9d8da411473aa07.exe"C:\Users\Admin\AppData\Local\Temp\59b97db7d19fc17dd9d8da411473aa07.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\59b97db7d19fc17dd9d8da411473aa07.exeC:\Users\Admin\AppData\Local\Temp\59b97db7d19fc17dd9d8da411473aa07.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\59b97db7d19fc17dd9d8da411473aa07.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5fe6d9796de95a9765cf7f2826e60f14e
SHA1cae13acf8c70782969fed7fac2ae9b3c94af1c1f
SHA256376e6d4d57670524517aa5c269f554de3c9564180aaea64270580e837508fbba
SHA512c51cb5de6d55e019ec3b329d10fbb964b8a2741af66a735ec5b3959d74056aaa06ef5e136edf1bbe19e64603388954cdd3bdd9d2c56b030da2d5fe21f9a92008