Analysis
-
max time kernel
134s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
85ac4acc25feaf3267699d7c53c41c3a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
85ac4acc25feaf3267699d7c53c41c3a.exe
Resource
win10v2004-20231215-en
General
-
Target
85ac4acc25feaf3267699d7c53c41c3a.exe
-
Size
1000KB
-
MD5
85ac4acc25feaf3267699d7c53c41c3a
-
SHA1
4302053e670e6aa3a4de2f2be680bb8b496de038
-
SHA256
69e384a5a2ae06e080dc4b1dd5c781ceac03ebf482306dacc70d8be6e3ac53e9
-
SHA512
6e98867415698b1b64a1f737073e72e0273fafb378c2ecdcfb896f9460c26c9c9dd12557c31a73ba445f9f5890da8f9dad5c0629ed961d8eac6851df80c79629
-
SSDEEP
24576:2NbIlahToZ+ATM6WqQS561B+5vMiqt0gj2ed:2ZIshToZC6T5QqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3484 85ac4acc25feaf3267699d7c53c41c3a.exe -
Executes dropped EXE 1 IoCs
pid Process 3484 85ac4acc25feaf3267699d7c53c41c3a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 15 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3484 85ac4acc25feaf3267699d7c53c41c3a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3484 85ac4acc25feaf3267699d7c53c41c3a.exe 3484 85ac4acc25feaf3267699d7c53c41c3a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2472 85ac4acc25feaf3267699d7c53c41c3a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2472 85ac4acc25feaf3267699d7c53c41c3a.exe 3484 85ac4acc25feaf3267699d7c53c41c3a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2472 wrote to memory of 3484 2472 85ac4acc25feaf3267699d7c53c41c3a.exe 24 PID 2472 wrote to memory of 3484 2472 85ac4acc25feaf3267699d7c53c41c3a.exe 24 PID 2472 wrote to memory of 3484 2472 85ac4acc25feaf3267699d7c53c41c3a.exe 24 PID 3484 wrote to memory of 3996 3484 85ac4acc25feaf3267699d7c53c41c3a.exe 43 PID 3484 wrote to memory of 3996 3484 85ac4acc25feaf3267699d7c53c41c3a.exe 43 PID 3484 wrote to memory of 3996 3484 85ac4acc25feaf3267699d7c53c41c3a.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe"C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exeC:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD564c43349a5d2e19bcbef469942a12ded
SHA10ff37d64e2d4de9d9f7455d7710958bb386efb02
SHA256a97f2218512494900bf7c7cc15cb6f196835bd03fc0c16172e7714483bd4cf0a
SHA5126264a2851bf64ad64fd266025fd21b3773b444290ad25b275fd4f66f430fb4f25b8d341d3ade275ef9167b39f599886330d392a3f41dd6af6de58872924697a4