Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
6fe7cf98e62ad23876244e6e13d3b591.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6fe7cf98e62ad23876244e6e13d3b591.exe
Resource
win10v2004-20231222-en
General
-
Target
6fe7cf98e62ad23876244e6e13d3b591.exe
-
Size
506KB
-
MD5
6fe7cf98e62ad23876244e6e13d3b591
-
SHA1
058f633e859a4c99daa58caa30617fd14c473034
-
SHA256
e11248b38c239cefa372174c94182e7bce13e2576cd917f2e434da5614e730e0
-
SHA512
a7756234f6821bc9c04f2e34e1d02a96ca12d804ac44c79107bee856a4b86762514242268077d694db65ce0ae53915568c567cf0950004cc357624ee178ca0f7
-
SSDEEP
12288:0MzOQYaOVwVlJqYtCffDX38T40L+f4JNdO2:0oYaO6Vl5IfX0qfkNdO2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2488 6fe7cf98e62ad23876244e6e13d3b591.exe -
Executes dropped EXE 1 IoCs
pid Process 2488 6fe7cf98e62ad23876244e6e13d3b591.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2488 6fe7cf98e62ad23876244e6e13d3b591.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2488 6fe7cf98e62ad23876244e6e13d3b591.exe 2488 6fe7cf98e62ad23876244e6e13d3b591.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4480 6fe7cf98e62ad23876244e6e13d3b591.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4480 6fe7cf98e62ad23876244e6e13d3b591.exe 2488 6fe7cf98e62ad23876244e6e13d3b591.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4480 wrote to memory of 2488 4480 6fe7cf98e62ad23876244e6e13d3b591.exe 38 PID 4480 wrote to memory of 2488 4480 6fe7cf98e62ad23876244e6e13d3b591.exe 38 PID 4480 wrote to memory of 2488 4480 6fe7cf98e62ad23876244e6e13d3b591.exe 38 PID 2488 wrote to memory of 4884 2488 6fe7cf98e62ad23876244e6e13d3b591.exe 47 PID 2488 wrote to memory of 4884 2488 6fe7cf98e62ad23876244e6e13d3b591.exe 47 PID 2488 wrote to memory of 4884 2488 6fe7cf98e62ad23876244e6e13d3b591.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fe7cf98e62ad23876244e6e13d3b591.exe"C:\Users\Admin\AppData\Local\Temp\6fe7cf98e62ad23876244e6e13d3b591.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\6fe7cf98e62ad23876244e6e13d3b591.exeC:\Users\Admin\AppData\Local\Temp\6fe7cf98e62ad23876244e6e13d3b591.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\6fe7cf98e62ad23876244e6e13d3b591.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD505f3b4cc2131efaf5678de358f6f0e3e
SHA1c68f0de9d3bb2270b23ba76191fd3cc77322d3e3
SHA2560e36b34b379821f087061758a1bbb561cdfdd444588125351845685623ca5e63
SHA51258025567e3404766db22f9aa7505346b1bd805a1ae40623d62e468023d12fa45bc6f5a26b642d06a863db4b401d8e45348814d662c253b8f8f91550b11c582d8