Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
75f63fe49ee89884a0db3c04bddb239c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75f63fe49ee89884a0db3c04bddb239c.exe
Resource
win10v2004-20231222-en
General
-
Target
75f63fe49ee89884a0db3c04bddb239c.exe
-
Size
506KB
-
MD5
75f63fe49ee89884a0db3c04bddb239c
-
SHA1
513b2734cceaaf364fd05809657f55f453910fb2
-
SHA256
7cfc99f0f284b314bb124640176e8f578fd5e7d2a6c33f51185baa24b78b7285
-
SHA512
adf2d83fabbdad8a3b7066b5b6859f3da443a39fae585137f71de2c8ca9fce4c84d59300067f27348b0494bf2ee0b1200f7a2925daf5e8bb566d8f8a12e37f45
-
SSDEEP
12288:CZUIFn3vTRh6NGF9zSS+njhb7vS6As0AAFcPk+/ZVsxLG6Xnl9:CZUIFn3rRh6+AS+Vb7vSjAAo7SG63j
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2192 75f63fe49ee89884a0db3c04bddb239c.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 75f63fe49ee89884a0db3c04bddb239c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2192 75f63fe49ee89884a0db3c04bddb239c.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2192 75f63fe49ee89884a0db3c04bddb239c.exe 2192 75f63fe49ee89884a0db3c04bddb239c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1880 75f63fe49ee89884a0db3c04bddb239c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1880 75f63fe49ee89884a0db3c04bddb239c.exe 2192 75f63fe49ee89884a0db3c04bddb239c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2192 1880 75f63fe49ee89884a0db3c04bddb239c.exe 86 PID 1880 wrote to memory of 2192 1880 75f63fe49ee89884a0db3c04bddb239c.exe 86 PID 1880 wrote to memory of 2192 1880 75f63fe49ee89884a0db3c04bddb239c.exe 86 PID 2192 wrote to memory of 2096 2192 75f63fe49ee89884a0db3c04bddb239c.exe 89 PID 2192 wrote to memory of 2096 2192 75f63fe49ee89884a0db3c04bddb239c.exe 89 PID 2192 wrote to memory of 2096 2192 75f63fe49ee89884a0db3c04bddb239c.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\75f63fe49ee89884a0db3c04bddb239c.exe"C:\Users\Admin\AppData\Local\Temp\75f63fe49ee89884a0db3c04bddb239c.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\75f63fe49ee89884a0db3c04bddb239c.exeC:\Users\Admin\AppData\Local\Temp\75f63fe49ee89884a0db3c04bddb239c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\75f63fe49ee89884a0db3c04bddb239c.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5f21e7a67ec821cf0b76b245c705218dc
SHA10b6bae6084d92c56fa750a9ecbec7ade0d471d16
SHA2564477bf286224ae9b66ba0346d5f063f3175aba4e31bd104b71719d165826f216
SHA512c6fffcfd2600f5cd24298793249b8d34cef4cac23970b196e6566d2aa37a2d505e4f215a5d91c4a30f7e121941fd8247ef669c7ce97dee231baf2b0e88f34c49