Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/02/2024, 17:56

General

  • Target

    8a29c602a4cd58103f12d8d6a46064f1.exe

  • Size

    1000KB

  • MD5

    8a29c602a4cd58103f12d8d6a46064f1

  • SHA1

    476e4c93229d99dab752af43d033c21241df55f5

  • SHA256

    29db59b100972320a44423e791fd590c02560705ed18540a251a8b1633fb15ac

  • SHA512

    74696a068902c6022e3ef029b27d4cd002e75b92c8995e033bef96081dd586723259e53c1c8dc8e81f94d3d5d177ea753887066513dfb9ba92c08cda9b7ef50f

  • SSDEEP

    24576:lAoWjUt85q8nA4AzlBCo8o1B+5vMiqt0gj2ed:ALnt+bCo8iqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe
    "C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe
      C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:1336

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe

          Filesize

          1000KB

          MD5

          061b6d430fd2a0d062c656921b69936b

          SHA1

          24983ea76f316cbb169dde41bbe163c4b0107e7b

          SHA256

          5ed72b5af548b9a60fb6875e3b1602f482ab80d5a5f5519a68384214902933b3

          SHA512

          f1e659449a5f3a514a5846bf73eddbdf2875dcd0e3bbebf64a3a823baab967eea61f64616db9721cd474ea7577246e8ee846f19dfce1e01337541c355321c70a

        • memory/3196-13-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/3196-16-0x0000000001510000-0x0000000001593000-memory.dmp

          Filesize

          524KB

        • memory/3196-20-0x0000000004F00000-0x0000000004F7E000-memory.dmp

          Filesize

          504KB

        • memory/3196-21-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/3196-27-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/4888-0-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/4888-1-0x0000000001510000-0x0000000001593000-memory.dmp

          Filesize

          524KB

        • memory/4888-2-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/4888-11-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB