Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2024 02:19

General

  • Target

    85ac4acc25feaf3267699d7c53c41c3a.exe

  • Size

    1000KB

  • MD5

    85ac4acc25feaf3267699d7c53c41c3a

  • SHA1

    4302053e670e6aa3a4de2f2be680bb8b496de038

  • SHA256

    69e384a5a2ae06e080dc4b1dd5c781ceac03ebf482306dacc70d8be6e3ac53e9

  • SHA512

    6e98867415698b1b64a1f737073e72e0273fafb378c2ecdcfb896f9460c26c9c9dd12557c31a73ba445f9f5890da8f9dad5c0629ed961d8eac6851df80c79629

  • SSDEEP

    24576:2NbIlahToZ+ATM6WqQS561B+5vMiqt0gj2ed:2ZIshToZC6T5QqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe
    "C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe
      C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    29KB

    MD5

    f3e91f53647c46729e75765b0f0910f5

    SHA1

    98570badd3e4cefe77a6e54bb08b28a90e34372c

    SHA256

    f7416cc6fa7279f01af82bd8622acf5dbf1e2a0e52f671a3d8eea6afa71c696c

    SHA512

    469cad6aed95a59f63ea13b8a4609fe30c43b206b37fe079eb160fc0ae31e8fc6d109c0ee37b7ff33f10e4de3266c98b380fb10d2db8deda7234daf42e502c39

  • C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe

    Filesize

    347KB

    MD5

    3535808c0c9228c7542d878d812d6352

    SHA1

    033f1c8669b72544a6c5ae82ff8ad2ceab26eafa

    SHA256

    b2c408da5b617c1d3e2c4d1f1b1ca9c254e7c93dbdeab495b6ca6b4649d958de

    SHA512

    8e29d0eb74165e0812f86e7900fbc8579c041ca4f13cb791aaa5564ebbdbe101d01cd7ea6a066d33d5b8768fbb8883fdbe626a8777477012311026b0cb94ff63

  • C:\Users\Admin\AppData\Local\Temp\Tar6BA.tmp

    Filesize

    13KB

    MD5

    374ee67b714afe8d41a3ae8b40ed114e

    SHA1

    8b7ab4a0355cb4b757fa80c5e2032fe7d76f9771

    SHA256

    b809477ffa3eb3bf0a9a46a764ab9786b348f259127004bc593d0be6f8684c25

    SHA512

    3c4357f67a57db76b5221b9eb366684f484074a15c31eb355e15c9fb54bcb7091f0609b0a24a922216f36fb5a9832a0d7982542bcfcb203a03eb5d8703682c88

  • \Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe

    Filesize

    754KB

    MD5

    64694a0b31078fcaab378698e6b0c6e7

    SHA1

    179d8b0d17d5df73d045291b54e68651174d3446

    SHA256

    fd7c28ff3d607d0418e98b265bfbbdc5546ae674bc301b0e5de43e001bd750ec

    SHA512

    30484ae9e4af9983f9d4591462651f22723e4cb4c793b9ca32c467733c3f0bd1227835b5e572e6154a787afec3cd98d1511dad9918c56f808a52bf0f709379cd

  • memory/1964-17-0x0000000002E20000-0x0000000002EA3000-memory.dmp

    Filesize

    524KB

  • memory/1964-14-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1964-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/1964-1-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1964-2-0x00000000001A0000-0x0000000000223000-memory.dmp

    Filesize

    524KB

  • memory/2980-20-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2980-22-0x0000000000290000-0x0000000000313000-memory.dmp

    Filesize

    524KB

  • memory/2980-24-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2980-29-0x0000000000320000-0x000000000039E000-memory.dmp

    Filesize

    504KB

  • memory/2980-67-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB