Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
764e238f5dc4e60e03148c6ce122d2f6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
764e238f5dc4e60e03148c6ce122d2f6.exe
Resource
win10v2004-20231215-en
General
-
Target
764e238f5dc4e60e03148c6ce122d2f6.exe
-
Size
1000KB
-
MD5
764e238f5dc4e60e03148c6ce122d2f6
-
SHA1
dc392796b82ae74786e0c54922dc51a4f5392887
-
SHA256
e7bfea95068ae18b9056771c4f348803259a07d0e4c4f3592803fa2810ec373c
-
SHA512
227caaf5a03e57fd1642097f493d70a259e3f9303d776354a9fe04fe523375223eff2a0203829e9e20e1734af868cf778bf3a53a237fcd69604190b12ecec996
-
SSDEEP
24576:rS/T17m6rdVG2qlAgGKYOD3xDV1B+5vMiqt0gj2ed:oqWpqlAgGlODBDZqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2244 764e238f5dc4e60e03148c6ce122d2f6.exe -
Executes dropped EXE 1 IoCs
pid Process 2244 764e238f5dc4e60e03148c6ce122d2f6.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 pastebin.com 11 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2244 764e238f5dc4e60e03148c6ce122d2f6.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2244 764e238f5dc4e60e03148c6ce122d2f6.exe 2244 764e238f5dc4e60e03148c6ce122d2f6.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4864 764e238f5dc4e60e03148c6ce122d2f6.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4864 764e238f5dc4e60e03148c6ce122d2f6.exe 2244 764e238f5dc4e60e03148c6ce122d2f6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2244 4864 764e238f5dc4e60e03148c6ce122d2f6.exe 88 PID 4864 wrote to memory of 2244 4864 764e238f5dc4e60e03148c6ce122d2f6.exe 88 PID 4864 wrote to memory of 2244 4864 764e238f5dc4e60e03148c6ce122d2f6.exe 88 PID 2244 wrote to memory of 1632 2244 764e238f5dc4e60e03148c6ce122d2f6.exe 90 PID 2244 wrote to memory of 1632 2244 764e238f5dc4e60e03148c6ce122d2f6.exe 90 PID 2244 wrote to memory of 1632 2244 764e238f5dc4e60e03148c6ce122d2f6.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\764e238f5dc4e60e03148c6ce122d2f6.exe"C:\Users\Admin\AppData\Local\Temp\764e238f5dc4e60e03148c6ce122d2f6.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\764e238f5dc4e60e03148c6ce122d2f6.exeC:\Users\Admin\AppData\Local\Temp\764e238f5dc4e60e03148c6ce122d2f6.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\764e238f5dc4e60e03148c6ce122d2f6.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD56db913cf489fa04db6bd4858c115090a
SHA14530b30430ea0f2f6906b1e7a413e470db363fbb
SHA2561ed427b0642e69c351b4cc9d620d4f6f5ccc129c9556f8e0f1e2c4542405d363
SHA5121821b4215a9e2c15ef7b4b6951711a8f22c0d7078f691ef60b8ce63fcd70b382985290e49b78ea27855abf1f326522a300afd4f2da5b87b4bd243ba31d73b5b4