Analysis
-
max time kernel
93s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-02-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
a1143032ba8532ff8e5fb100228ab0f5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a1143032ba8532ff8e5fb100228ab0f5.exe
Resource
win10v2004-20240221-en
General
-
Target
a1143032ba8532ff8e5fb100228ab0f5.exe
-
Size
506KB
-
MD5
a1143032ba8532ff8e5fb100228ab0f5
-
SHA1
af144182e55e92b9a85072326e115677b5eb46ff
-
SHA256
5df3d6db668a709a3a492630fb858834d90719e95879089d235dbf9483ff0f0a
-
SHA512
d7c313f1bf4ae73afcbc5c2b52e96672c2f13269cc3452f38e1c55bc4b919586adfb6efa5d312e393160d28e59231c718f52f2e84a0ee29fe601352f096cf19b
-
SSDEEP
12288:wY+tOFcxNj46Eo0C6iWKv1XS2dWOIcugluiVb8v:wYqOylEo0C6ONW+oSbG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2716 a1143032ba8532ff8e5fb100228ab0f5.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 a1143032ba8532ff8e5fb100228ab0f5.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 18 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2716 a1143032ba8532ff8e5fb100228ab0f5.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2064 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2716 a1143032ba8532ff8e5fb100228ab0f5.exe 2716 a1143032ba8532ff8e5fb100228ab0f5.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4600 a1143032ba8532ff8e5fb100228ab0f5.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4600 a1143032ba8532ff8e5fb100228ab0f5.exe 2716 a1143032ba8532ff8e5fb100228ab0f5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4600 wrote to memory of 2716 4600 a1143032ba8532ff8e5fb100228ab0f5.exe 87 PID 4600 wrote to memory of 2716 4600 a1143032ba8532ff8e5fb100228ab0f5.exe 87 PID 4600 wrote to memory of 2716 4600 a1143032ba8532ff8e5fb100228ab0f5.exe 87 PID 2716 wrote to memory of 2064 2716 a1143032ba8532ff8e5fb100228ab0f5.exe 90 PID 2716 wrote to memory of 2064 2716 a1143032ba8532ff8e5fb100228ab0f5.exe 90 PID 2716 wrote to memory of 2064 2716 a1143032ba8532ff8e5fb100228ab0f5.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exe"C:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exeC:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\a1143032ba8532ff8e5fb100228ab0f5.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5ab21220cb729a27e8f9a7283a22355f9
SHA1648f3174de6f45be397e58063d4f793cf6789865
SHA256cbba7489a0774b418467823d795305396cd0d7af83cf92cb89003726a7f46f55
SHA512fd957c15d0d408dba3f5edddae7ee2819135a16d6cacd0bf6f59f1a4394009bc70211e805d799cc879843528c0c7313bb3d0588609f28b0393c2d8e09be724f1