Analysis
-
max time kernel
112s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 02:35
Static task
static1
Behavioral task
behavioral1
Sample
85b44d3ef859dda4968d3436df496230.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
85b44d3ef859dda4968d3436df496230.exe
Resource
win10v2004-20231215-en
General
-
Target
85b44d3ef859dda4968d3436df496230.exe
-
Size
241KB
-
MD5
85b44d3ef859dda4968d3436df496230
-
SHA1
40b7fafb44ee26a69a79d2df38a4066d5d267b42
-
SHA256
4a25eda87fa154de897fd51cd38e7f4d44626a9f8fcd470c96023838e73cf707
-
SHA512
82824cf8328cdd6eb25920f56dff3f82f9b741d8d3b3e838f6bebcaafb8d43238e11da783cd156c8ab194e73b3909e9d3c72642387bea5908a5b7517894249ac
-
SSDEEP
6144:creezz5SF9Qb313lfeBEpU4ex7BbePnkv6dEnbnos9T:sAHo1JeBEpUv7Bqc6cl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3436 85b44d3ef859dda4968d3436df496230.exe -
Executes dropped EXE 1 IoCs
pid Process 3436 85b44d3ef859dda4968d3436df496230.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 9 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3436 85b44d3ef859dda4968d3436df496230.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3436 85b44d3ef859dda4968d3436df496230.exe 3436 85b44d3ef859dda4968d3436df496230.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3480 85b44d3ef859dda4968d3436df496230.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3480 85b44d3ef859dda4968d3436df496230.exe 3436 85b44d3ef859dda4968d3436df496230.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3436 3480 85b44d3ef859dda4968d3436df496230.exe 85 PID 3480 wrote to memory of 3436 3480 85b44d3ef859dda4968d3436df496230.exe 85 PID 3480 wrote to memory of 3436 3480 85b44d3ef859dda4968d3436df496230.exe 85 PID 3436 wrote to memory of 2112 3436 85b44d3ef859dda4968d3436df496230.exe 87 PID 3436 wrote to memory of 2112 3436 85b44d3ef859dda4968d3436df496230.exe 87 PID 3436 wrote to memory of 2112 3436 85b44d3ef859dda4968d3436df496230.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\85b44d3ef859dda4968d3436df496230.exe"C:\Users\Admin\AppData\Local\Temp\85b44d3ef859dda4968d3436df496230.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\85b44d3ef859dda4968d3436df496230.exeC:\Users\Admin\AppData\Local\Temp\85b44d3ef859dda4968d3436df496230.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\85b44d3ef859dda4968d3436df496230.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
241KB
MD5883ad9f38a36a03c48b97e591e9dcfba
SHA18a3b5e53b2d4803c8ca837c675986a37c64dd41d
SHA2562000d09a0c63412f569b8b02d9102030bad47e4503479f2f1491abae55bfbc33
SHA512fd34c7db9873a8fb27d018a1a39fa116dfb19ed97c3adcfeb415329c274b8c37b4422924007c5a3323164513306f26400b491cd835a48df928942f96d49f56eb