Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
673ac00c17a5a112564f04970e0d572e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
673ac00c17a5a112564f04970e0d572e.exe
Resource
win10v2004-20231215-en
General
-
Target
673ac00c17a5a112564f04970e0d572e.exe
-
Size
1000KB
-
MD5
673ac00c17a5a112564f04970e0d572e
-
SHA1
da833a5d25df46a7c588d5bc2efdf56b51b36d0f
-
SHA256
005de43157a15c010ccc970790d866b2d110561a7e4b2563b7b385094c6ce290
-
SHA512
95baacdcbec14505efc27dfd504963901b719707646916005d792111f52b183b0583d2c7a913fdfabb8c480966fa438cf08b238851a79cf67fc2bec3d9526ca0
-
SSDEEP
24576:kTudO3yJXm9V4/AwzLnh6jJM31B+5vMiqt0gj2ed:nO3yJXFzLnAjAqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3360 673ac00c17a5a112564f04970e0d572e.exe -
Executes dropped EXE 1 IoCs
pid Process 3360 673ac00c17a5a112564f04970e0d572e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3360 673ac00c17a5a112564f04970e0d572e.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1292 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3360 673ac00c17a5a112564f04970e0d572e.exe 3360 673ac00c17a5a112564f04970e0d572e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2492 673ac00c17a5a112564f04970e0d572e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2492 673ac00c17a5a112564f04970e0d572e.exe 3360 673ac00c17a5a112564f04970e0d572e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2492 wrote to memory of 3360 2492 673ac00c17a5a112564f04970e0d572e.exe 85 PID 2492 wrote to memory of 3360 2492 673ac00c17a5a112564f04970e0d572e.exe 85 PID 2492 wrote to memory of 3360 2492 673ac00c17a5a112564f04970e0d572e.exe 85 PID 3360 wrote to memory of 1292 3360 673ac00c17a5a112564f04970e0d572e.exe 90 PID 3360 wrote to memory of 1292 3360 673ac00c17a5a112564f04970e0d572e.exe 90 PID 3360 wrote to memory of 1292 3360 673ac00c17a5a112564f04970e0d572e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\673ac00c17a5a112564f04970e0d572e.exe"C:\Users\Admin\AppData\Local\Temp\673ac00c17a5a112564f04970e0d572e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\673ac00c17a5a112564f04970e0d572e.exeC:\Users\Admin\AppData\Local\Temp\673ac00c17a5a112564f04970e0d572e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\673ac00c17a5a112564f04970e0d572e.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD53d4cf017a0103f76401afc728aad69cf
SHA149e723c69991b47d853d0555ae2fda5af3833844
SHA2567d3db75e92d048050c6eb1f1c4c760dcd1e1455322af68d050f0351117419635
SHA5123755352e447b76914f28f30747f1f0e36221be6d8037bd5be1319fb377b3ab46c6b27a99663f96fe33369c327517ad90986e5ca64b84226d3ece9d597ea8bb39