Analysis
-
max time kernel
143s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 00:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
578a52f62ffa409c6e5b2c9e5d801e6a.exe
Resource
win7-20231215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
578a52f62ffa409c6e5b2c9e5d801e6a.exe
Resource
win10v2004-20231222-en
9 signatures
150 seconds
General
-
Target
578a52f62ffa409c6e5b2c9e5d801e6a.exe
-
Size
241KB
-
MD5
578a52f62ffa409c6e5b2c9e5d801e6a
-
SHA1
fe2fe05a72f46fe6b1cc917d488c883952497b15
-
SHA256
7781867a58749f8cce49e16eefddc54e0cbdb2117e8ce8d3c43729a6de47282c
-
SHA512
df233af664978f6d5ee6ad957b36383d3af71b75e654af944ab71fbde6525961bb836a70c064828082a08ae780f0b28fbbed2f16e11ce9423a448b5be419d0b5
-
SSDEEP
6144:POGB6vFOdkKdsMI/fIi+poWa9s9OEttzDjST7kw9Y5:U9OdkZMI+GStteTrk
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2396 578a52f62ffa409c6e5b2c9e5d801e6a.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 578a52f62ffa409c6e5b2c9e5d801e6a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2396 578a52f62ffa409c6e5b2c9e5d801e6a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4268 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 578a52f62ffa409c6e5b2c9e5d801e6a.exe 2396 578a52f62ffa409c6e5b2c9e5d801e6a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 456 578a52f62ffa409c6e5b2c9e5d801e6a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 456 578a52f62ffa409c6e5b2c9e5d801e6a.exe 2396 578a52f62ffa409c6e5b2c9e5d801e6a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 456 wrote to memory of 2396 456 578a52f62ffa409c6e5b2c9e5d801e6a.exe 15 PID 456 wrote to memory of 2396 456 578a52f62ffa409c6e5b2c9e5d801e6a.exe 15 PID 456 wrote to memory of 2396 456 578a52f62ffa409c6e5b2c9e5d801e6a.exe 15 PID 2396 wrote to memory of 4268 2396 578a52f62ffa409c6e5b2c9e5d801e6a.exe 39 PID 2396 wrote to memory of 4268 2396 578a52f62ffa409c6e5b2c9e5d801e6a.exe 39 PID 2396 wrote to memory of 4268 2396 578a52f62ffa409c6e5b2c9e5d801e6a.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\578a52f62ffa409c6e5b2c9e5d801e6a.exeC:\Users\Admin\AppData\Local\Temp\578a52f62ffa409c6e5b2c9e5d801e6a.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\578a52f62ffa409c6e5b2c9e5d801e6a.exe" /TN Google_Trk_Updater /F2⤵
- Creates scheduled task(s)
PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\578a52f62ffa409c6e5b2c9e5d801e6a.exe"C:\Users\Admin\AppData\Local\Temp\578a52f62ffa409c6e5b2c9e5d801e6a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:456