Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
67f24f2e800017f7ea47e9a3a1d80c21.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67f24f2e800017f7ea47e9a3a1d80c21.exe
Resource
win10v2004-20231222-en
General
-
Target
67f24f2e800017f7ea47e9a3a1d80c21.exe
-
Size
242KB
-
MD5
67f24f2e800017f7ea47e9a3a1d80c21
-
SHA1
b2378ea5b5e39ee9e414a43d177fd7e80336f55c
-
SHA256
0dec7ce332f469c29e665117cbd9eeb43f69aab8ad33c2c5f13eb9952579d711
-
SHA512
fabc5c3a6980c13d2dee0b8df5a2e620822e4e7d53c45a7030f3c8114d59fd27c6aa7ff0f4cec994d0a7435514d7f013baa15eb5a1e832733ec749d311fed72c
-
SSDEEP
6144:12r51dhuZVXsdVIRPiGdDrIR6B7nWwtGWfHCFor7O:QLnuHXmVIticDpB7WAGV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2984 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Executes dropped EXE 1 IoCs
pid Process 2984 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2984 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2984 67f24f2e800017f7ea47e9a3a1d80c21.exe 2984 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1912 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1912 67f24f2e800017f7ea47e9a3a1d80c21.exe 2984 67f24f2e800017f7ea47e9a3a1d80c21.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2984 1912 67f24f2e800017f7ea47e9a3a1d80c21.exe 90 PID 1912 wrote to memory of 2984 1912 67f24f2e800017f7ea47e9a3a1d80c21.exe 90 PID 1912 wrote to memory of 2984 1912 67f24f2e800017f7ea47e9a3a1d80c21.exe 90 PID 2984 wrote to memory of 5076 2984 67f24f2e800017f7ea47e9a3a1d80c21.exe 92 PID 2984 wrote to memory of 5076 2984 67f24f2e800017f7ea47e9a3a1d80c21.exe 92 PID 2984 wrote to memory of 5076 2984 67f24f2e800017f7ea47e9a3a1d80c21.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exe"C:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exeC:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\67f24f2e800017f7ea47e9a3a1d80c21.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:5076
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD5e79e1c6140f2a19549f524fc09159dee
SHA1b9cd204f3b3898cdd044901e3bb43c71a15b09b9
SHA2560eb3b190141a64f466f844eaa512e297ec089ad054112192a11c7aae956ed5bb
SHA5123fe15975412151dda46ffec7376a706f9de88de4ea38c82c20b03c34e58f38c6c0a127c440e2572ce6f0d91305ab4da74304bbb0c2dd5090653c9e8955db1825