Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
ac24a89ec6fd317386e0da3289d60b40.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac24a89ec6fd317386e0da3289d60b40.exe
Resource
win10v2004-20240226-en
General
-
Target
ac24a89ec6fd317386e0da3289d60b40.exe
-
Size
1000KB
-
MD5
ac24a89ec6fd317386e0da3289d60b40
-
SHA1
5afbac428ef988ab896b8f9816dafb89bfc6b3da
-
SHA256
972ffdbdf59ce6c93d15414113a66eeeddff3a89beb09b18c70f2d8e6149eb02
-
SHA512
b91799c9fe6192ab0e69c4d3b237f0818a3f3bb75afd06436442d05f5833347e3c3291e11d4ae90c0583a1831e0651198f65fa620168bda280a8fbbe9f7425d5
-
SSDEEP
24576:vHXsnCldiQ7rSme98481B+5vMiqt0gj2ed:dld9qneqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2728 ac24a89ec6fd317386e0da3289d60b40.exe -
Executes dropped EXE 1 IoCs
pid Process 2728 ac24a89ec6fd317386e0da3289d60b40.exe -
Loads dropped DLL 1 IoCs
pid Process 2380 ac24a89ec6fd317386e0da3289d60b40.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2728 ac24a89ec6fd317386e0da3289d60b40.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2728 ac24a89ec6fd317386e0da3289d60b40.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2380 ac24a89ec6fd317386e0da3289d60b40.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2380 ac24a89ec6fd317386e0da3289d60b40.exe 2728 ac24a89ec6fd317386e0da3289d60b40.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2728 2380 ac24a89ec6fd317386e0da3289d60b40.exe 28 PID 2380 wrote to memory of 2728 2380 ac24a89ec6fd317386e0da3289d60b40.exe 28 PID 2380 wrote to memory of 2728 2380 ac24a89ec6fd317386e0da3289d60b40.exe 28 PID 2380 wrote to memory of 2728 2380 ac24a89ec6fd317386e0da3289d60b40.exe 28 PID 2728 wrote to memory of 2668 2728 ac24a89ec6fd317386e0da3289d60b40.exe 29 PID 2728 wrote to memory of 2668 2728 ac24a89ec6fd317386e0da3289d60b40.exe 29 PID 2728 wrote to memory of 2668 2728 ac24a89ec6fd317386e0da3289d60b40.exe 29 PID 2728 wrote to memory of 2668 2728 ac24a89ec6fd317386e0da3289d60b40.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exe"C:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exeC:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
1000KB
MD5765cc9953de8f0e379addbecbcb2f620
SHA12a20dd6ba40612803fbd6011a19fef2f2f41b281
SHA256a42e0eccaf1c996c43d656cac98589c25a84e51f75ecc8bb875b941e395c4032
SHA5122fc0e518b5bed579e466bcbfd61f1c43e82aea0fbebe71ae3685fcc21b1d1b4e98c7d781ba744c82c2c38f17446deda3ce74180a79d407b4028bf761978f86db