Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
649518268948a177ce2caccf89aba11d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
649518268948a177ce2caccf89aba11d.exe
Resource
win10v2004-20231222-en
General
-
Target
649518268948a177ce2caccf89aba11d.exe
-
Size
506KB
-
MD5
649518268948a177ce2caccf89aba11d
-
SHA1
536805fbedfecc54fbcdcbd5420cf6d3202552de
-
SHA256
92973c866e4841452b00d674d127c06eb094d6edb403426311799ed41d3b3a26
-
SHA512
8196caeade10759a2767709abeea08b5b6731d76f5a54aadc3c1b086f9729263b1c1457f6455e74504a086910aed682bafcb389be216bcf8eb8dd34228b55123
-
SSDEEP
12288:WfqJjumG9fUl9mzvAH1g0BVX2dZUeCSIwfJuqS0fs:Wfq8HaVpyZT4wf8gs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1148 649518268948a177ce2caccf89aba11d.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 649518268948a177ce2caccf89aba11d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1148 649518268948a177ce2caccf89aba11d.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1148 649518268948a177ce2caccf89aba11d.exe 1148 649518268948a177ce2caccf89aba11d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3512 649518268948a177ce2caccf89aba11d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1812 svchost.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3512 649518268948a177ce2caccf89aba11d.exe 1148 649518268948a177ce2caccf89aba11d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3512 wrote to memory of 1148 3512 649518268948a177ce2caccf89aba11d.exe 24 PID 3512 wrote to memory of 1148 3512 649518268948a177ce2caccf89aba11d.exe 24 PID 3512 wrote to memory of 1148 3512 649518268948a177ce2caccf89aba11d.exe 24 PID 1148 wrote to memory of 1816 1148 649518268948a177ce2caccf89aba11d.exe 30 PID 1148 wrote to memory of 1816 1148 649518268948a177ce2caccf89aba11d.exe 30 PID 1148 wrote to memory of 1816 1148 649518268948a177ce2caccf89aba11d.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\649518268948a177ce2caccf89aba11d.exe"C:\Users\Admin\AppData\Local\Temp\649518268948a177ce2caccf89aba11d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\649518268948a177ce2caccf89aba11d.exeC:\Users\Admin\AppData\Local\Temp\649518268948a177ce2caccf89aba11d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\649518268948a177ce2caccf89aba11d.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1816
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5e5dd9e089d77b743f6b70677c6da2693
SHA1d08f623bcd80582a5120e138a0d33fad5bcbb745
SHA2562a139658417adf097129a81c5f1647b5dd4802c7b621bdb77960bbe80721c0bf
SHA5127bb97dbf8b4103fa4847e65bd7ee4c0c3d9b69d2b061f22306a8aa9ba0931b7e0c9c46671df18a388e2ad80a8970f1dbc6efb4db13b131fa4345014d907078d1