Analysis

  • max time kernel
    134s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2024 02:19

General

  • Target

    85ac4acc25feaf3267699d7c53c41c3a.exe

  • Size

    1000KB

  • MD5

    85ac4acc25feaf3267699d7c53c41c3a

  • SHA1

    4302053e670e6aa3a4de2f2be680bb8b496de038

  • SHA256

    69e384a5a2ae06e080dc4b1dd5c781ceac03ebf482306dacc70d8be6e3ac53e9

  • SHA512

    6e98867415698b1b64a1f737073e72e0273fafb378c2ecdcfb896f9460c26c9c9dd12557c31a73ba445f9f5890da8f9dad5c0629ed961d8eac6851df80c79629

  • SSDEEP

    24576:2NbIlahToZ+ATM6WqQS561B+5vMiqt0gj2ed:2ZIshToZC6T5QqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe
    "C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe
      C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3484
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:3996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\85ac4acc25feaf3267699d7c53c41c3a.exe

    Filesize

    65KB

    MD5

    64c43349a5d2e19bcbef469942a12ded

    SHA1

    0ff37d64e2d4de9d9f7455d7710958bb386efb02

    SHA256

    a97f2218512494900bf7c7cc15cb6f196835bd03fc0c16172e7714483bd4cf0a

    SHA512

    6264a2851bf64ad64fd266025fd21b3773b444290ad25b275fd4f66f430fb4f25b8d341d3ade275ef9167b39f599886330d392a3f41dd6af6de58872924697a4

  • memory/2472-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2472-2-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2472-1-0x0000000001510000-0x0000000001593000-memory.dmp

    Filesize

    524KB

  • memory/2472-11-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/3484-14-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/3484-15-0x0000000001610000-0x0000000001693000-memory.dmp

    Filesize

    524KB

  • memory/3484-20-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3484-23-0x0000000004F10000-0x0000000004F8E000-memory.dmp

    Filesize

    504KB

  • memory/3484-27-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB