Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2024 02:29
Static task
static1
Behavioral task
behavioral1
Sample
82a3e324f5eaeb6961b6d1d8801d3cfa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
82a3e324f5eaeb6961b6d1d8801d3cfa.exe
Resource
win10v2004-20231222-en
General
-
Target
82a3e324f5eaeb6961b6d1d8801d3cfa.exe
-
Size
535KB
-
MD5
82a3e324f5eaeb6961b6d1d8801d3cfa
-
SHA1
5f4c5b3f2ddf0b35355cf47b2492fc2dd4598ee5
-
SHA256
f98b79d8353242f3dc59ab4a47d41986b2a4725f2b03bdf7eccc626f5c44bdcc
-
SHA512
6571b15929ca3f3d9cab7a7eeff49aabc4b96a6e543880cb369a655bf17751727c9820a391be8d174ca38736a27d1e102b607d4fd32b19512166d3a7ad8cc05e
-
SSDEEP
6144:UgkAIdxqvB4AY11S2OWQ4dolrdCFiH1HU5TfqTe70uOVmb+rNesqoDUr8MZafNF3:KQ4AnMulkYVHUpD/U4sqZ83DSBP8Mw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2168 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 12 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2168 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 2168 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1832 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1832 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 2168 82a3e324f5eaeb6961b6d1d8801d3cfa.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2168 1832 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 85 PID 1832 wrote to memory of 2168 1832 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 85 PID 1832 wrote to memory of 2168 1832 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 85 PID 2168 wrote to memory of 464 2168 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 89 PID 2168 wrote to memory of 464 2168 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 89 PID 2168 wrote to memory of 464 2168 82a3e324f5eaeb6961b6d1d8801d3cfa.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exe"C:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exeC:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\82a3e324f5eaeb6961b6d1d8801d3cfa.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
535KB
MD54a3f2b53a550e012fc78a92ba6cfccbb
SHA17a21a9654b2da925c663b3ce54b97f66c57cdcf0
SHA2565734791ad8261321e9e9ea1f8e6a80c5b872b84c6ab4fa4c73fa9f0ab349f2e6
SHA5123d568e4876a78d4d74c1b5328ef9f19ec92a334f7dc5096693c2172836a49067be6bebde93de2a0e52ed27213ba1cf1e66210e6e878adb8864165d29ef083926