Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
ab9f77059380929311dbf6c472b474f4.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ab9f77059380929311dbf6c472b474f4.exe
Resource
win10v2004-20240226-en
General
-
Target
ab9f77059380929311dbf6c472b474f4.exe
-
Size
1000KB
-
MD5
ab9f77059380929311dbf6c472b474f4
-
SHA1
6572adb608dc45e2df2ae24d3029bfc2510e4cb1
-
SHA256
7b5bddd1e583cbb13ecc44110a725eb4659b5865c38f811db05ea24315947a55
-
SHA512
1257bd59dd8ccb1d34627cda429413bed20e078d91c147f22920458608049997a77f26f81b2384b7978958e84a72121a77cb715e8203b3318ea5f61390b04deb
-
SSDEEP
24576:x6VHn/Zb4vHA7p6GJ81B+5vMiqt0gj2ed:xWl4vOpbUqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2852 ab9f77059380929311dbf6c472b474f4.exe -
Executes dropped EXE 1 IoCs
pid Process 2852 ab9f77059380929311dbf6c472b474f4.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 25 pastebin.com 14 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2852 ab9f77059380929311dbf6c472b474f4.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2852 ab9f77059380929311dbf6c472b474f4.exe 2852 ab9f77059380929311dbf6c472b474f4.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4660 ab9f77059380929311dbf6c472b474f4.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4660 ab9f77059380929311dbf6c472b474f4.exe 2852 ab9f77059380929311dbf6c472b474f4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4660 wrote to memory of 2852 4660 ab9f77059380929311dbf6c472b474f4.exe 86 PID 4660 wrote to memory of 2852 4660 ab9f77059380929311dbf6c472b474f4.exe 86 PID 4660 wrote to memory of 2852 4660 ab9f77059380929311dbf6c472b474f4.exe 86 PID 2852 wrote to memory of 456 2852 ab9f77059380929311dbf6c472b474f4.exe 90 PID 2852 wrote to memory of 456 2852 ab9f77059380929311dbf6c472b474f4.exe 90 PID 2852 wrote to memory of 456 2852 ab9f77059380929311dbf6c472b474f4.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe"C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exeC:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:456
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD57c95f23de9b0125cb48c92861fe3eda5
SHA169f08f2d17f720f90c833716f7bdb1eb7d62f155
SHA2562beb82b706fbdb353ccddccf6f03a6ccaf9d799926311989f445ad7a07799bd0
SHA51220e517897fad0b0d9eb9862a3a15e064867b728d84ee9a13b3ab2cf89accfe39a7e8ec908943a0e530c1104b4b098d3b9b2f130f94f1cbe6f8974f444b6a88ea