Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02/02/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
8a29c602a4cd58103f12d8d6a46064f1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a29c602a4cd58103f12d8d6a46064f1.exe
Resource
win10v2004-20231215-en
General
-
Target
8a29c602a4cd58103f12d8d6a46064f1.exe
-
Size
1000KB
-
MD5
8a29c602a4cd58103f12d8d6a46064f1
-
SHA1
476e4c93229d99dab752af43d033c21241df55f5
-
SHA256
29db59b100972320a44423e791fd590c02560705ed18540a251a8b1633fb15ac
-
SHA512
74696a068902c6022e3ef029b27d4cd002e75b92c8995e033bef96081dd586723259e53c1c8dc8e81f94d3d5d177ea753887066513dfb9ba92c08cda9b7ef50f
-
SSDEEP
24576:lAoWjUt85q8nA4AzlBCo8o1B+5vMiqt0gj2ed:ALnt+bCo8iqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3196 8a29c602a4cd58103f12d8d6a46064f1.exe -
Executes dropped EXE 1 IoCs
pid Process 3196 8a29c602a4cd58103f12d8d6a46064f1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 14 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3196 8a29c602a4cd58103f12d8d6a46064f1.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1336 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3196 8a29c602a4cd58103f12d8d6a46064f1.exe 3196 8a29c602a4cd58103f12d8d6a46064f1.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4888 8a29c602a4cd58103f12d8d6a46064f1.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4888 8a29c602a4cd58103f12d8d6a46064f1.exe 3196 8a29c602a4cd58103f12d8d6a46064f1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4888 wrote to memory of 3196 4888 8a29c602a4cd58103f12d8d6a46064f1.exe 86 PID 4888 wrote to memory of 3196 4888 8a29c602a4cd58103f12d8d6a46064f1.exe 86 PID 4888 wrote to memory of 3196 4888 8a29c602a4cd58103f12d8d6a46064f1.exe 86 PID 3196 wrote to memory of 1336 3196 8a29c602a4cd58103f12d8d6a46064f1.exe 87 PID 3196 wrote to memory of 1336 3196 8a29c602a4cd58103f12d8d6a46064f1.exe 87 PID 3196 wrote to memory of 1336 3196 8a29c602a4cd58103f12d8d6a46064f1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe"C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exeC:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\8a29c602a4cd58103f12d8d6a46064f1.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5061b6d430fd2a0d062c656921b69936b
SHA124983ea76f316cbb169dde41bbe163c4b0107e7b
SHA2565ed72b5af548b9a60fb6875e3b1602f482ab80d5a5f5519a68384214902933b3
SHA512f1e659449a5f3a514a5846bf73eddbdf2875dcd0e3bbebf64a3a823baab967eea61f64616db9721cd474ea7577246e8ee846f19dfce1e01337541c355321c70a