Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
a1143032ba8532ff8e5fb100228ab0f5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a1143032ba8532ff8e5fb100228ab0f5.exe
Resource
win10v2004-20240221-en
General
-
Target
a1143032ba8532ff8e5fb100228ab0f5.exe
-
Size
506KB
-
MD5
a1143032ba8532ff8e5fb100228ab0f5
-
SHA1
af144182e55e92b9a85072326e115677b5eb46ff
-
SHA256
5df3d6db668a709a3a492630fb858834d90719e95879089d235dbf9483ff0f0a
-
SHA512
d7c313f1bf4ae73afcbc5c2b52e96672c2f13269cc3452f38e1c55bc4b919586adfb6efa5d312e393160d28e59231c718f52f2e84a0ee29fe601352f096cf19b
-
SSDEEP
12288:wY+tOFcxNj46Eo0C6iWKv1XS2dWOIcugluiVb8v:wYqOylEo0C6ONW+oSbG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2852 a1143032ba8532ff8e5fb100228ab0f5.exe -
Executes dropped EXE 1 IoCs
pid Process 2852 a1143032ba8532ff8e5fb100228ab0f5.exe -
Loads dropped DLL 1 IoCs
pid Process 2968 a1143032ba8532ff8e5fb100228ab0f5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 7 pastebin.com 5 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2852 a1143032ba8532ff8e5fb100228ab0f5.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2852 a1143032ba8532ff8e5fb100228ab0f5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2968 a1143032ba8532ff8e5fb100228ab0f5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2968 a1143032ba8532ff8e5fb100228ab0f5.exe 2852 a1143032ba8532ff8e5fb100228ab0f5.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2852 2968 a1143032ba8532ff8e5fb100228ab0f5.exe 3 PID 2968 wrote to memory of 2852 2968 a1143032ba8532ff8e5fb100228ab0f5.exe 3 PID 2968 wrote to memory of 2852 2968 a1143032ba8532ff8e5fb100228ab0f5.exe 3 PID 2968 wrote to memory of 2852 2968 a1143032ba8532ff8e5fb100228ab0f5.exe 3 PID 2852 wrote to memory of 2660 2852 a1143032ba8532ff8e5fb100228ab0f5.exe 2 PID 2852 wrote to memory of 2660 2852 a1143032ba8532ff8e5fb100228ab0f5.exe 2 PID 2852 wrote to memory of 2660 2852 a1143032ba8532ff8e5fb100228ab0f5.exe 2 PID 2852 wrote to memory of 2660 2852 a1143032ba8532ff8e5fb100228ab0f5.exe 2
Processes
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exe" /TN Google_Trk_Updater /F1⤵
- Creates scheduled task(s)
PID:2660
-
C:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exeC:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exe1⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2852
-
C:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exe"C:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
506KB
MD5a1a6e7d39d2fccc2fdf82575dd0eebca
SHA1e9f8b4974224f5a5edc504ea55e75f18b596ee07
SHA256825568522386f5b56de30f4c7c75dbff1d6fe425b0ee0f0761a6b40d613a7f4e
SHA51265be2c82b27637526c0f15f408d68e09ff702a6a6ba875bf0c899377b3343b41926e86a922ef3485e5606b3ebaa74bdc9ff170204a49e0308a1bdc5be6e8e479