Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
82a3e324f5eaeb6961b6d1d8801d3cfa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
82a3e324f5eaeb6961b6d1d8801d3cfa.exe
Resource
win10v2004-20231222-en
General
-
Target
82a3e324f5eaeb6961b6d1d8801d3cfa.exe
-
Size
535KB
-
MD5
82a3e324f5eaeb6961b6d1d8801d3cfa
-
SHA1
5f4c5b3f2ddf0b35355cf47b2492fc2dd4598ee5
-
SHA256
f98b79d8353242f3dc59ab4a47d41986b2a4725f2b03bdf7eccc626f5c44bdcc
-
SHA512
6571b15929ca3f3d9cab7a7eeff49aabc4b96a6e543880cb369a655bf17751727c9820a391be8d174ca38736a27d1e102b607d4fd32b19512166d3a7ad8cc05e
-
SSDEEP
6144:UgkAIdxqvB4AY11S2OWQ4dolrdCFiH1HU5TfqTe70uOVmb+rNesqoDUr8MZafNF3:KQ4AnMulkYVHUpD/U4sqZ83DSBP8Mw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3040 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Executes dropped EXE 1 IoCs
pid Process 3040 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Loads dropped DLL 1 IoCs
pid Process 2300 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3040 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2704 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3040 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2300 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2300 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 3040 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2300 wrote to memory of 3040 2300 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 3 PID 2300 wrote to memory of 3040 2300 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 3 PID 2300 wrote to memory of 3040 2300 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 3 PID 2300 wrote to memory of 3040 2300 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 3 PID 3040 wrote to memory of 2704 3040 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 2 PID 3040 wrote to memory of 2704 3040 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 2 PID 3040 wrote to memory of 2704 3040 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 2 PID 3040 wrote to memory of 2704 3040 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 2
Processes
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:2704
-
C:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exeC:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3040
-
C:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exe"C:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
535KB
MD52a8ba55818313c8c61b351c38025226d
SHA1929e9987aaa046fb273a5276d48d14df0fcd25f3
SHA256d82cc45e086b71744e12adc0f9cfd7ab52235420e721e0a735997f176a7cd59c
SHA512449ba64e69947569213ede7ece9b7eed8371576e293bd79356dbddd51aa112b63c7719db80ec851414ec91ebcdfe382c08bd5b78958c9805c88801e9c601a0e4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06