Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
582ca5d22d1f6491710a495d9b8daa8a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
582ca5d22d1f6491710a495d9b8daa8a.exe
Resource
win10v2004-20231215-en
General
-
Target
582ca5d22d1f6491710a495d9b8daa8a.exe
-
Size
535KB
-
MD5
582ca5d22d1f6491710a495d9b8daa8a
-
SHA1
dbb3f337e197af145b1963dec44c75501fe717c2
-
SHA256
777907e460c3683666b57f3cba307fc2ec36c85ef383b87974954385e1a091d8
-
SHA512
96dafc8332fc7566c077541ea86792af1ab5bb5436b542ca9ef9d61c287104214ddf54c60585cce9905d54c8f8b1b44f6f67f13ba7740af7f04da69623a56b05
-
SSDEEP
12288:KVoNih3ODZaK1y6Q85yKCVze9lqWOvabSw7VgJmQ:yha0nKYzOOy5Q
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2996 582ca5d22d1f6491710a495d9b8daa8a.exe -
Executes dropped EXE 1 IoCs
pid Process 2996 582ca5d22d1f6491710a495d9b8daa8a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2996 582ca5d22d1f6491710a495d9b8daa8a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2996 582ca5d22d1f6491710a495d9b8daa8a.exe 2996 582ca5d22d1f6491710a495d9b8daa8a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2508 582ca5d22d1f6491710a495d9b8daa8a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2508 582ca5d22d1f6491710a495d9b8daa8a.exe 2996 582ca5d22d1f6491710a495d9b8daa8a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2996 2508 582ca5d22d1f6491710a495d9b8daa8a.exe 91 PID 2508 wrote to memory of 2996 2508 582ca5d22d1f6491710a495d9b8daa8a.exe 91 PID 2508 wrote to memory of 2996 2508 582ca5d22d1f6491710a495d9b8daa8a.exe 91 PID 2996 wrote to memory of 3972 2996 582ca5d22d1f6491710a495d9b8daa8a.exe 92 PID 2996 wrote to memory of 3972 2996 582ca5d22d1f6491710a495d9b8daa8a.exe 92 PID 2996 wrote to memory of 3972 2996 582ca5d22d1f6491710a495d9b8daa8a.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\582ca5d22d1f6491710a495d9b8daa8a.exe"C:\Users\Admin\AppData\Local\Temp\582ca5d22d1f6491710a495d9b8daa8a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\582ca5d22d1f6491710a495d9b8daa8a.exeC:\Users\Admin\AppData\Local\Temp\582ca5d22d1f6491710a495d9b8daa8a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\582ca5d22d1f6491710a495d9b8daa8a.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
535KB
MD550e202d875b829f4ea66d3b5519d8810
SHA1409517c63b8632297f37582bf37bdc073d704f85
SHA2560df8c09fc87aa83040dbcc3629edb399151340c771f6b4b0598903abe539fda2
SHA51209cda95e2686aef2b9e56e8b5d361b637e181acb22a8666c01146f72016dae8a946e2589056a3e759c65cf3bab7434cc99ba840be10cebed16d88f00ccb19db9