Analysis

  • max time kernel
    95s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 09:08

General

  • Target

    a17a7f48bc2d36ca9907be9be0ca9319.exe

  • Size

    242KB

  • MD5

    a17a7f48bc2d36ca9907be9be0ca9319

  • SHA1

    3492242d87c9ab9dca9825fa03ac6e1ade37314c

  • SHA256

    34d59fbf68fdf0ba5c3cbffb43bf0e9d6643b931bce7f7d56f587977aff41374

  • SHA512

    df461cd8b475552ae0f3edd2e1a17ddd40e98f9d7884ecb5d7d0a1e7dca61b60b3453e92db498e288ca425e341065501b4e78c58fd87b70ed9b52d10f8ad3abf

  • SSDEEP

    3072:tVAY+tsLWvp1peb93fOSY5A7W+1PuLCOSG3ybd6Z5DP1p9EFb3ufhbk4Vd0AZUCc:tCYWjeb9lYoK+G3aC5DP1pirupk/d7D

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a17a7f48bc2d36ca9907be9be0ca9319.exe
    "C:\Users\Admin\AppData\Local\Temp\a17a7f48bc2d36ca9907be9be0ca9319.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\a17a7f48bc2d36ca9907be9be0ca9319.exe
      C:\Users\Admin\AppData\Local\Temp\a17a7f48bc2d36ca9907be9be0ca9319.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:5100
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\a17a7f48bc2d36ca9907be9be0ca9319.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:1556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\a17a7f48bc2d36ca9907be9be0ca9319.exe

    Filesize

    242KB

    MD5

    45bd77e1c6a05e6c3af0a7fc36c5851e

    SHA1

    06d3ccc1bcf08e95e0c569ab9482998d6dbbf16b

    SHA256

    371fa2e195abc67d7ce80dce99279e308e44854216374313e13d9f77235c2ea3

    SHA512

    1ca114ea2f8fd53d5367e6176b0edc0b7afaa1ab3d77c8412c31d8d791e134ad4f02d1b879df53c19cfae3961c5580242ff99f644e361a8aa76ea8f57228d94f

  • memory/1520-0-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/1520-1-0x00000000014C0000-0x0000000001577000-memory.dmp

    Filesize

    732KB

  • memory/1520-2-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1520-11-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/5100-14-0x00000000016C0000-0x0000000001777000-memory.dmp

    Filesize

    732KB

  • memory/5100-13-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/5100-15-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/5100-20-0x0000000004F80000-0x0000000004FE7000-memory.dmp

    Filesize

    412KB

  • memory/5100-21-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB