Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
8044af50fe95c7ed15532c1464d5dc1d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8044af50fe95c7ed15532c1464d5dc1d.exe
Resource
win10v2004-20231215-en
General
-
Target
8044af50fe95c7ed15532c1464d5dc1d.exe
-
Size
506KB
-
MD5
8044af50fe95c7ed15532c1464d5dc1d
-
SHA1
3bd680036d9b5445ae37537a43cac2aa337dde1a
-
SHA256
33d4a48e121734c624ef1f5cc6819e7e546041943b540bdb2d9acb38c54b72bd
-
SHA512
c82175219ba3e7f912621372a3959df0172def08197989560d93be1e4a42e90dca179cdc8cafc6b15583377faac24bbf612c17efb57f49a336be068335634910
-
SSDEEP
12288:q6SxVwOuj3wrQvWNx1oxtj8LGVciJNHoeRIgOdn:q6Sx6Osgs8foxtj8LGVciJrRIgOdn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 228 8044af50fe95c7ed15532c1464d5dc1d.exe -
Executes dropped EXE 1 IoCs
pid Process 228 8044af50fe95c7ed15532c1464d5dc1d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 pastebin.com 8 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 228 8044af50fe95c7ed15532c1464d5dc1d.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 228 8044af50fe95c7ed15532c1464d5dc1d.exe 228 8044af50fe95c7ed15532c1464d5dc1d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 60 8044af50fe95c7ed15532c1464d5dc1d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 60 8044af50fe95c7ed15532c1464d5dc1d.exe 228 8044af50fe95c7ed15532c1464d5dc1d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 60 wrote to memory of 228 60 8044af50fe95c7ed15532c1464d5dc1d.exe 84 PID 60 wrote to memory of 228 60 8044af50fe95c7ed15532c1464d5dc1d.exe 84 PID 60 wrote to memory of 228 60 8044af50fe95c7ed15532c1464d5dc1d.exe 84 PID 228 wrote to memory of 2664 228 8044af50fe95c7ed15532c1464d5dc1d.exe 85 PID 228 wrote to memory of 2664 228 8044af50fe95c7ed15532c1464d5dc1d.exe 85 PID 228 wrote to memory of 2664 228 8044af50fe95c7ed15532c1464d5dc1d.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8044af50fe95c7ed15532c1464d5dc1d.exe"C:\Users\Admin\AppData\Local\Temp\8044af50fe95c7ed15532c1464d5dc1d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\8044af50fe95c7ed15532c1464d5dc1d.exeC:\Users\Admin\AppData\Local\Temp\8044af50fe95c7ed15532c1464d5dc1d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8044af50fe95c7ed15532c1464d5dc1d.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD52921a1eb567c2faced72779b2b67390a
SHA13cc3f696c86d3d0a434c313aae0d20eba4084f33
SHA2560b3c65c412d16f0b9fb484ed608be06804d54ffc7b09b6ef2b9c1c31cc44c36c
SHA51293ec61105ee6ad2a5667623c4c3c2017ffd2a2d8df0b588112d6d317f364b1af1e96e95d4ab051daaab100d4f67765e05f719772786dc91610041c37c32a0427