Analysis
-
max time kernel
86s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 11:21
Static task
static1
Behavioral task
behavioral1
Sample
9708418126006d41887254cd45d80b7e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9708418126006d41887254cd45d80b7e.exe
Resource
win10v2004-20231215-en
General
-
Target
9708418126006d41887254cd45d80b7e.exe
-
Size
771KB
-
MD5
9708418126006d41887254cd45d80b7e
-
SHA1
d83bf2b0e94370ea1f06b5400bba72cbcb53c852
-
SHA256
a9302c106c46b2077113573a907dc6aa7f4145c1caaed0580b83d26f2ed724ee
-
SHA512
a3444fc9367abc46399a87464411853f1d92d4b5c2626ef829c2e73c0509487955fa66967277a8ab66b562e89140333edd7d72083f4132ffbdcc862bc317e8c4
-
SSDEEP
12288:FEWYX5VbRLKO21GJgnrfBWNFZYLom73hY6r4LC393wyC6Y9oR+aMECaBwQ2tb5Jv:qXj21GkNWBOowr4LiNijq1B+5vM0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2816 9708418126006d41887254cd45d80b7e.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 9708418126006d41887254cd45d80b7e.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 16 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2816 9708418126006d41887254cd45d80b7e.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2816 9708418126006d41887254cd45d80b7e.exe 2816 9708418126006d41887254cd45d80b7e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4728 9708418126006d41887254cd45d80b7e.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4728 9708418126006d41887254cd45d80b7e.exe 2816 9708418126006d41887254cd45d80b7e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4728 wrote to memory of 2816 4728 9708418126006d41887254cd45d80b7e.exe 86 PID 4728 wrote to memory of 2816 4728 9708418126006d41887254cd45d80b7e.exe 86 PID 4728 wrote to memory of 2816 4728 9708418126006d41887254cd45d80b7e.exe 86 PID 2816 wrote to memory of 1972 2816 9708418126006d41887254cd45d80b7e.exe 87 PID 2816 wrote to memory of 1972 2816 9708418126006d41887254cd45d80b7e.exe 87 PID 2816 wrote to memory of 1972 2816 9708418126006d41887254cd45d80b7e.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9708418126006d41887254cd45d80b7e.exe"C:\Users\Admin\AppData\Local\Temp\9708418126006d41887254cd45d80b7e.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\9708418126006d41887254cd45d80b7e.exeC:\Users\Admin\AppData\Local\Temp\9708418126006d41887254cd45d80b7e.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9708418126006d41887254cd45d80b7e.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD59219f5cec101a8e37bdab6e15d7d5dcb
SHA13544739e011fcc4f5e0f2804a0833d7bf0966135
SHA2564a60514cf182310f5622cde4ccdbbbfbf4d88289444cb7145f916c5e7d7e21e9
SHA512785d29dbae8f9374523105764789e8a0e06241c7f83037ec43e4c70565132f03226849763dd90fd00856e001e68ebe8a4bf3dc825b966e026286d768dcdb5b74