Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
9c08c21638b683c04872f3c98793b244.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c08c21638b683c04872f3c98793b244.exe
Resource
win10v2004-20231215-en
General
-
Target
9c08c21638b683c04872f3c98793b244.exe
-
Size
506KB
-
MD5
9c08c21638b683c04872f3c98793b244
-
SHA1
4102bf61426a1efd00238fda1d5fdb5bd868b3dd
-
SHA256
3e6ddf8ad6a9c16f7172737ea1f70108aaa5cb984ff37876d446872df8fed6dc
-
SHA512
976781328850e7520d5ef01e1a1ea8d7433ad0d4d680e22580c5a1f26fd9bdadc301d33ec748d47f35e8fb78a0dc9f99ba61c239d877aab04e1bbc692cbe1155
-
SSDEEP
12288:WguUmdkxnxqD3d4anhDo0+E39eWjLlJ3aFS:WguUckG3dzo0XlpaE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1764 9c08c21638b683c04872f3c98793b244.exe -
Executes dropped EXE 1 IoCs
pid Process 1764 9c08c21638b683c04872f3c98793b244.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 13 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1764 9c08c21638b683c04872f3c98793b244.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1764 9c08c21638b683c04872f3c98793b244.exe 1764 9c08c21638b683c04872f3c98793b244.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2636 9c08c21638b683c04872f3c98793b244.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2636 9c08c21638b683c04872f3c98793b244.exe 1764 9c08c21638b683c04872f3c98793b244.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2636 wrote to memory of 1764 2636 9c08c21638b683c04872f3c98793b244.exe 85 PID 2636 wrote to memory of 1764 2636 9c08c21638b683c04872f3c98793b244.exe 85 PID 2636 wrote to memory of 1764 2636 9c08c21638b683c04872f3c98793b244.exe 85 PID 1764 wrote to memory of 2424 1764 9c08c21638b683c04872f3c98793b244.exe 86 PID 1764 wrote to memory of 2424 1764 9c08c21638b683c04872f3c98793b244.exe 86 PID 1764 wrote to memory of 2424 1764 9c08c21638b683c04872f3c98793b244.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c08c21638b683c04872f3c98793b244.exe"C:\Users\Admin\AppData\Local\Temp\9c08c21638b683c04872f3c98793b244.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\9c08c21638b683c04872f3c98793b244.exeC:\Users\Admin\AppData\Local\Temp\9c08c21638b683c04872f3c98793b244.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9c08c21638b683c04872f3c98793b244.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5eef02304440e7665f2100b78970c7120
SHA14111919051e58be0685739a1465fbd2c73bd808b
SHA25620dd570f5add2090c315e2f79d20e8ddba192b9ad0ca5829180b7006bad9b168
SHA512d986e10e4a8b384af5343b44e93d2b170557fcc76ba6ea30eb3501ed03d2f87508374c6bc198636e526f9e523b55573a7778d28beaa1e44c3cde0c94db6c92ed