Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
79f037b4ad9b668ed7825b681f26a32d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79f037b4ad9b668ed7825b681f26a32d.exe
Resource
win10v2004-20231222-en
General
-
Target
79f037b4ad9b668ed7825b681f26a32d.exe
-
Size
808KB
-
MD5
79f037b4ad9b668ed7825b681f26a32d
-
SHA1
89335227923a78eb089fdd1a7935220930b80587
-
SHA256
261f6096b399657d161ad0b03a7bb2468ef0973c95ef773d08f3b143de79723f
-
SHA512
792a7e82170e291e89210208f9b08de599013569a853c71685973b3fe36a65b8dd23c0e5f8689d7fddc80192a6490a2359a58aa371b9c8513e4844074d7f440c
-
SSDEEP
24576:5pbvPk+0gYUM1zRuC/WL56enKiuF4U3Jv/0:5GngYV1AC/AQGKisZv/0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\GoogleUpdater\\GoogleUpdater.exe" 79f037b4ad9b668ed7825b681f26a32d.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 79f037b4ad9b668ed7825b681f26a32d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate GoogleUpdater.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 79f037b4ad9b668ed7825b681f26a32d.exe -
Executes dropped EXE 2 IoCs
pid Process 4832 GoogleUpdater.exe 1240 GoogleUpdater.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleUpdater.exe = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleUpdater\\GoogleUpdater.exe" 79f037b4ad9b668ed7825b681f26a32d.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1988 set thread context of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 4832 set thread context of 1240 4832 GoogleUpdater.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier GoogleUpdater.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 79f037b4ad9b668ed7825b681f26a32d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 79f037b4ad9b668ed7825b681f26a32d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 79f037b4ad9b668ed7825b681f26a32d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 79f037b4ad9b668ed7825b681f26a32d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoogleUpdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoogleUpdater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier GoogleUpdater.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 79f037b4ad9b668ed7825b681f26a32d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier GoogleUpdater.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 79f037b4ad9b668ed7825b681f26a32d.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4892 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1240 GoogleUpdater.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeSecurityPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeTakeOwnershipPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeLoadDriverPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeSystemProfilePrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeSystemtimePrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeProfSingleProcessPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeIncBasePriorityPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeCreatePagefilePrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeBackupPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeRestorePrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeShutdownPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeDebugPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeSystemEnvironmentPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeChangeNotifyPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeRemoteShutdownPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeUndockPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeManageVolumePrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeImpersonatePrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeCreateGlobalPrivilege 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: 33 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: 34 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: 35 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: 36 3952 79f037b4ad9b668ed7825b681f26a32d.exe Token: SeIncreaseQuotaPrivilege 1240 GoogleUpdater.exe Token: SeSecurityPrivilege 1240 GoogleUpdater.exe Token: SeTakeOwnershipPrivilege 1240 GoogleUpdater.exe Token: SeLoadDriverPrivilege 1240 GoogleUpdater.exe Token: SeSystemProfilePrivilege 1240 GoogleUpdater.exe Token: SeSystemtimePrivilege 1240 GoogleUpdater.exe Token: SeProfSingleProcessPrivilege 1240 GoogleUpdater.exe Token: SeIncBasePriorityPrivilege 1240 GoogleUpdater.exe Token: SeCreatePagefilePrivilege 1240 GoogleUpdater.exe Token: SeBackupPrivilege 1240 GoogleUpdater.exe Token: SeRestorePrivilege 1240 GoogleUpdater.exe Token: SeShutdownPrivilege 1240 GoogleUpdater.exe Token: SeDebugPrivilege 1240 GoogleUpdater.exe Token: SeSystemEnvironmentPrivilege 1240 GoogleUpdater.exe Token: SeChangeNotifyPrivilege 1240 GoogleUpdater.exe Token: SeRemoteShutdownPrivilege 1240 GoogleUpdater.exe Token: SeUndockPrivilege 1240 GoogleUpdater.exe Token: SeManageVolumePrivilege 1240 GoogleUpdater.exe Token: SeImpersonatePrivilege 1240 GoogleUpdater.exe Token: SeCreateGlobalPrivilege 1240 GoogleUpdater.exe Token: 33 1240 GoogleUpdater.exe Token: 34 1240 GoogleUpdater.exe Token: 35 1240 GoogleUpdater.exe Token: 36 1240 GoogleUpdater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1240 GoogleUpdater.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 1988 wrote to memory of 3952 1988 79f037b4ad9b668ed7825b681f26a32d.exe 87 PID 3952 wrote to memory of 4832 3952 79f037b4ad9b668ed7825b681f26a32d.exe 94 PID 3952 wrote to memory of 4832 3952 79f037b4ad9b668ed7825b681f26a32d.exe 94 PID 3952 wrote to memory of 4832 3952 79f037b4ad9b668ed7825b681f26a32d.exe 94 PID 3952 wrote to memory of 4424 3952 79f037b4ad9b668ed7825b681f26a32d.exe 96 PID 3952 wrote to memory of 4424 3952 79f037b4ad9b668ed7825b681f26a32d.exe 96 PID 3952 wrote to memory of 4424 3952 79f037b4ad9b668ed7825b681f26a32d.exe 96 PID 4424 wrote to memory of 4892 4424 cmd.exe 97 PID 4424 wrote to memory of 4892 4424 cmd.exe 97 PID 4424 wrote to memory of 4892 4424 cmd.exe 97 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98 PID 4832 wrote to memory of 1240 4832 GoogleUpdater.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\79f037b4ad9b668ed7825b681f26a32d.exe"C:\Users\Admin\AppData\Local\Temp\79f037b4ad9b668ed7825b681f26a32d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\79f037b4ad9b668ed7825b681f26a32d.exeC:\Users\Admin\AppData\Local\Temp\79f037b4ad9b668ed7825b681f26a32d.exe2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Roaming\GoogleUpdater\GoogleUpdater.exe"C:\Users\Admin\AppData\Roaming\GoogleUpdater\GoogleUpdater.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Roaming\GoogleUpdater\GoogleUpdater.exeC:\Users\Admin\AppData\Roaming\GoogleUpdater\GoogleUpdater.exe4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1240
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_dcsc_.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 24⤵
- Runs ping.exe
PID:4892
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD53639b7a23a11c05f0e2a103b63fd2953
SHA1f1d84bfddeea02ec1abef99ae65b354712783bc3
SHA2560fc839bfc2d7a480ea1b4e5f4a8ad38af0a60eced479ef8a04e63b57af22cdc6
SHA512a58d0fb379e2104058446c0c96dd761cd0dbab64fcee6c00d7cb29a4959f4eed753f72901ceb2481b24ed2a6670569b6e2a07a14f48c29fca72fa08988444d59
-
Filesize
808KB
MD579f037b4ad9b668ed7825b681f26a32d
SHA189335227923a78eb089fdd1a7935220930b80587
SHA256261f6096b399657d161ad0b03a7bb2468ef0973c95ef773d08f3b143de79723f
SHA512792a7e82170e291e89210208f9b08de599013569a853c71685973b3fe36a65b8dd23c0e5f8689d7fddc80192a6490a2359a58aa371b9c8513e4844074d7f440c