Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
71a22e1c468965c55346dd2d101e899e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
71a22e1c468965c55346dd2d101e899e.exe
Resource
win10v2004-20231215-en
General
-
Target
71a22e1c468965c55346dd2d101e899e.exe
-
Size
1000KB
-
MD5
71a22e1c468965c55346dd2d101e899e
-
SHA1
22e94e8093f9dbae64972716cec2267fb14efc55
-
SHA256
70e5a3fe2fb3cf5bd5ca4dace850713a4cb28a22b010d651ae7cf8db725836e8
-
SHA512
953a55b984414d31d690b99a8a935eb659a547dc23814a7dc65b98d010133875df25c20ca07fc0ca3add9435eb8eb1d4a6aafa1f87dda93fe624b2057acbd726
-
SSDEEP
24576:OyT8PHri1xd5Ez6GY76N1B+5vMiqt0gj2ed:O+8Pri8z62hqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3052 71a22e1c468965c55346dd2d101e899e.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 71a22e1c468965c55346dd2d101e899e.exe -
Loads dropped DLL 1 IoCs
pid Process 1152 71a22e1c468965c55346dd2d101e899e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3052 71a22e1c468965c55346dd2d101e899e.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3052 71a22e1c468965c55346dd2d101e899e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1152 71a22e1c468965c55346dd2d101e899e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1152 71a22e1c468965c55346dd2d101e899e.exe 3052 71a22e1c468965c55346dd2d101e899e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1152 wrote to memory of 3052 1152 71a22e1c468965c55346dd2d101e899e.exe 28 PID 1152 wrote to memory of 3052 1152 71a22e1c468965c55346dd2d101e899e.exe 28 PID 1152 wrote to memory of 3052 1152 71a22e1c468965c55346dd2d101e899e.exe 28 PID 1152 wrote to memory of 3052 1152 71a22e1c468965c55346dd2d101e899e.exe 28 PID 3052 wrote to memory of 2912 3052 71a22e1c468965c55346dd2d101e899e.exe 29 PID 3052 wrote to memory of 2912 3052 71a22e1c468965c55346dd2d101e899e.exe 29 PID 3052 wrote to memory of 2912 3052 71a22e1c468965c55346dd2d101e899e.exe 29 PID 3052 wrote to memory of 2912 3052 71a22e1c468965c55346dd2d101e899e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\71a22e1c468965c55346dd2d101e899e.exe"C:\Users\Admin\AppData\Local\Temp\71a22e1c468965c55346dd2d101e899e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\71a22e1c468965c55346dd2d101e899e.exeC:\Users\Admin\AppData\Local\Temp\71a22e1c468965c55346dd2d101e899e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\71a22e1c468965c55346dd2d101e899e.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
417KB
MD5b9e98c62090654624d2ad3debacb5356
SHA1e6c8cf415f9504faca66e19e2f5363355d6be8eb
SHA2568ed424d5261793c0fb469bffba7a1a25f8b3f848c609acb407f15a88e4f712b5
SHA512ce5377ea04b2368851d06c530c59feb57a175811a13ed887f9298835cce0fe373f5f0ad680eac2abdb58df3b6e0c80f5fcdffb154809a11fd9762580a510a898
-
Filesize
635KB
MD5ac7b246d59c337989f089d1fd8d3ce68
SHA148761e88288105d8dec55481f1319eb63a7c1d8d
SHA256fd4f9ba3289ce696f475738d43317302ebb19ade6f7f954bb0c6615584d7411e
SHA5128e9b87ea23337c7f17395f649ff790cafc1ea0140eff2a62b50bd60f2219e6ac29d53ab6463a0e85be83c7e23a6d42acfbcd350df8165c10e164e04759822839
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
1000KB
MD5a62f3ac922fc5d976b2e8412a814ec72
SHA1fdef27da260cc038d23d13e348f5ce5349d8acd5
SHA256b79a228f5473206f9fb79e30c4842367e95d3faec8f486b560031909aab8657a
SHA512814666bcd2c5d69b0558d7b6bcd550896fae23d1adc3781d601f75b9362b7faf8b23bffcc5f76e3e3abf58c4bbd11c5fc026dbd30e39439537bd883841802b0c