Analysis

  • max time kernel
    142s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/02/2024, 16:21

General

  • Target

    9c2047bf583f8b8f459c5ba48612b76f.exe

  • Size

    1000KB

  • MD5

    9c2047bf583f8b8f459c5ba48612b76f

  • SHA1

    411db7aa0eda7e2ab224646e7ca0e9503b2022a6

  • SHA256

    7a95e75e293c5868d6838b1474f0050a404e11b988719f83251bd5e5a4c211a4

  • SHA512

    a49555f54da2fa578f290b45cee9911b27d2438ce9386a8830b6abba4143d83bbf28d561275cb9407f0c2e75a0a2d33d8c0b9632a73b7720250f0b8eb87227b8

  • SSDEEP

    24576:2ryis7qB4K2W4rYe6FBkT1B+5vMiqt0gj2ed:cItMe6FabqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c2047bf583f8b8f459c5ba48612b76f.exe
    "C:\Users\Admin\AppData\Local\Temp\9c2047bf583f8b8f459c5ba48612b76f.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\9c2047bf583f8b8f459c5ba48612b76f.exe
      C:\Users\Admin\AppData\Local\Temp\9c2047bf583f8b8f459c5ba48612b76f.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\9c2047bf583f8b8f459c5ba48612b76f.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:3536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\9c2047bf583f8b8f459c5ba48612b76f.exe

          Filesize

          1000KB

          MD5

          2959da9c075f2defecb7f8645d923100

          SHA1

          34201554411973396adf2cee0e71041eb0182c8f

          SHA256

          af933bfc8cd82f5e4b13b2d34b03a501f6edb352853a49f3bbb1f825badb4ed9

          SHA512

          95031270b0b82bebdaefc523305120d0c3d3cf0cfa71cca40ea6cc56c4f3f4531c76cb239ad419684c5a833c39eeb0b1deb11d33c5a2f989b4aa26efee2b8e34

        • memory/2140-0-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/2140-1-0x0000000001510000-0x0000000001593000-memory.dmp

          Filesize

          524KB

        • memory/2140-2-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/2140-11-0x0000000000400000-0x000000000047E000-memory.dmp

          Filesize

          504KB

        • memory/5072-13-0x0000000000400000-0x0000000000483000-memory.dmp

          Filesize

          524KB

        • memory/5072-16-0x0000000001510000-0x0000000001593000-memory.dmp

          Filesize

          524KB

        • memory/5072-20-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/5072-21-0x0000000004FD0000-0x000000000504E000-memory.dmp

          Filesize

          504KB

        • memory/5072-27-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB