Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
85ac4acc25feaf3267699d7c53c41c3a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
85ac4acc25feaf3267699d7c53c41c3a.exe
Resource
win10v2004-20231215-en
General
-
Target
85ac4acc25feaf3267699d7c53c41c3a.exe
-
Size
1000KB
-
MD5
85ac4acc25feaf3267699d7c53c41c3a
-
SHA1
4302053e670e6aa3a4de2f2be680bb8b496de038
-
SHA256
69e384a5a2ae06e080dc4b1dd5c781ceac03ebf482306dacc70d8be6e3ac53e9
-
SHA512
6e98867415698b1b64a1f737073e72e0273fafb378c2ecdcfb896f9460c26c9c9dd12557c31a73ba445f9f5890da8f9dad5c0629ed961d8eac6851df80c79629
-
SSDEEP
24576:2NbIlahToZ+ATM6WqQS561B+5vMiqt0gj2ed:2ZIshToZC6T5QqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2980 85ac4acc25feaf3267699d7c53c41c3a.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 85ac4acc25feaf3267699d7c53c41c3a.exe -
Loads dropped DLL 1 IoCs
pid Process 1964 85ac4acc25feaf3267699d7c53c41c3a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2980 85ac4acc25feaf3267699d7c53c41c3a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2552 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2980 85ac4acc25feaf3267699d7c53c41c3a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1964 85ac4acc25feaf3267699d7c53c41c3a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1964 85ac4acc25feaf3267699d7c53c41c3a.exe 2980 85ac4acc25feaf3267699d7c53c41c3a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2980 1964 85ac4acc25feaf3267699d7c53c41c3a.exe 28 PID 1964 wrote to memory of 2980 1964 85ac4acc25feaf3267699d7c53c41c3a.exe 28 PID 1964 wrote to memory of 2980 1964 85ac4acc25feaf3267699d7c53c41c3a.exe 28 PID 1964 wrote to memory of 2980 1964 85ac4acc25feaf3267699d7c53c41c3a.exe 28 PID 2980 wrote to memory of 2552 2980 85ac4acc25feaf3267699d7c53c41c3a.exe 29 PID 2980 wrote to memory of 2552 2980 85ac4acc25feaf3267699d7c53c41c3a.exe 29 PID 2980 wrote to memory of 2552 2980 85ac4acc25feaf3267699d7c53c41c3a.exe 29 PID 2980 wrote to memory of 2552 2980 85ac4acc25feaf3267699d7c53c41c3a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe"C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exeC:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5f3e91f53647c46729e75765b0f0910f5
SHA198570badd3e4cefe77a6e54bb08b28a90e34372c
SHA256f7416cc6fa7279f01af82bd8622acf5dbf1e2a0e52f671a3d8eea6afa71c696c
SHA512469cad6aed95a59f63ea13b8a4609fe30c43b206b37fe079eb160fc0ae31e8fc6d109c0ee37b7ff33f10e4de3266c98b380fb10d2db8deda7234daf42e502c39
-
Filesize
347KB
MD53535808c0c9228c7542d878d812d6352
SHA1033f1c8669b72544a6c5ae82ff8ad2ceab26eafa
SHA256b2c408da5b617c1d3e2c4d1f1b1ca9c254e7c93dbdeab495b6ca6b4649d958de
SHA5128e29d0eb74165e0812f86e7900fbc8579c041ca4f13cb791aaa5564ebbdbe101d01cd7ea6a066d33d5b8768fbb8883fdbe626a8777477012311026b0cb94ff63
-
Filesize
13KB
MD5374ee67b714afe8d41a3ae8b40ed114e
SHA18b7ab4a0355cb4b757fa80c5e2032fe7d76f9771
SHA256b809477ffa3eb3bf0a9a46a764ab9786b348f259127004bc593d0be6f8684c25
SHA5123c4357f67a57db76b5221b9eb366684f484074a15c31eb355e15c9fb54bcb7091f0609b0a24a922216f36fb5a9832a0d7982542bcfcb203a03eb5d8703682c88
-
Filesize
754KB
MD564694a0b31078fcaab378698e6b0c6e7
SHA1179d8b0d17d5df73d045291b54e68651174d3446
SHA256fd7c28ff3d607d0418e98b265bfbbdc5546ae674bc301b0e5de43e001bd750ec
SHA51230484ae9e4af9983f9d4591462651f22723e4cb4c793b9ca32c467733c3f0bd1227835b5e572e6154a787afec3cd98d1511dad9918c56f808a52bf0f709379cd