Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2024, 10:04

General

  • Target

    ab9f77059380929311dbf6c472b474f4.exe

  • Size

    1000KB

  • MD5

    ab9f77059380929311dbf6c472b474f4

  • SHA1

    6572adb608dc45e2df2ae24d3029bfc2510e4cb1

  • SHA256

    7b5bddd1e583cbb13ecc44110a725eb4659b5865c38f811db05ea24315947a55

  • SHA512

    1257bd59dd8ccb1d34627cda429413bed20e078d91c147f22920458608049997a77f26f81b2384b7978958e84a72121a77cb715e8203b3318ea5f61390b04deb

  • SSDEEP

    24576:x6VHn/Zb4vHA7p6GJ81B+5vMiqt0gj2ed:xWl4vOpbUqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe
    "C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe
      C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ab9f77059380929311dbf6c472b474f4.exe

    Filesize

    1000KB

    MD5

    7c95f23de9b0125cb48c92861fe3eda5

    SHA1

    69f08f2d17f720f90c833716f7bdb1eb7d62f155

    SHA256

    2beb82b706fbdb353ccddccf6f03a6ccaf9d799926311989f445ad7a07799bd0

    SHA512

    20e517897fad0b0d9eb9862a3a15e064867b728d84ee9a13b3ab2cf89accfe39a7e8ec908943a0e530c1104b4b098d3b9b2f130f94f1cbe6f8974f444b6a88ea

  • memory/2852-14-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2852-17-0x0000000001510000-0x0000000001593000-memory.dmp

    Filesize

    524KB

  • memory/2852-20-0x0000000004F60000-0x0000000004FDE000-memory.dmp

    Filesize

    504KB

  • memory/2852-21-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2852-27-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/4660-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/4660-1-0x00000000016B0000-0x0000000001733000-memory.dmp

    Filesize

    524KB

  • memory/4660-2-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/4660-11-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB