Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
ac24a89ec6fd317386e0da3289d60b40.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac24a89ec6fd317386e0da3289d60b40.exe
Resource
win10v2004-20240226-en
General
-
Target
ac24a89ec6fd317386e0da3289d60b40.exe
-
Size
1000KB
-
MD5
ac24a89ec6fd317386e0da3289d60b40
-
SHA1
5afbac428ef988ab896b8f9816dafb89bfc6b3da
-
SHA256
972ffdbdf59ce6c93d15414113a66eeeddff3a89beb09b18c70f2d8e6149eb02
-
SHA512
b91799c9fe6192ab0e69c4d3b237f0818a3f3bb75afd06436442d05f5833347e3c3291e11d4ae90c0583a1831e0651198f65fa620168bda280a8fbbe9f7425d5
-
SSDEEP
24576:vHXsnCldiQ7rSme98481B+5vMiqt0gj2ed:dld9qneqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2904 ac24a89ec6fd317386e0da3289d60b40.exe -
Executes dropped EXE 1 IoCs
pid Process 2904 ac24a89ec6fd317386e0da3289d60b40.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 pastebin.com 21 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2904 ac24a89ec6fd317386e0da3289d60b40.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 ac24a89ec6fd317386e0da3289d60b40.exe 2904 ac24a89ec6fd317386e0da3289d60b40.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3316 ac24a89ec6fd317386e0da3289d60b40.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 3316 ac24a89ec6fd317386e0da3289d60b40.exe 2904 ac24a89ec6fd317386e0da3289d60b40.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3316 wrote to memory of 2904 3316 ac24a89ec6fd317386e0da3289d60b40.exe 88 PID 3316 wrote to memory of 2904 3316 ac24a89ec6fd317386e0da3289d60b40.exe 88 PID 3316 wrote to memory of 2904 3316 ac24a89ec6fd317386e0da3289d60b40.exe 88 PID 2904 wrote to memory of 1488 2904 ac24a89ec6fd317386e0da3289d60b40.exe 90 PID 2904 wrote to memory of 1488 2904 ac24a89ec6fd317386e0da3289d60b40.exe 90 PID 2904 wrote to memory of 1488 2904 ac24a89ec6fd317386e0da3289d60b40.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exe"C:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exeC:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ac24a89ec6fd317386e0da3289d60b40.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD585da3bcd3831a5ccf6d3b95dfa195f35
SHA114c93022b04d63b248e40b459cbb940dc26eb01f
SHA2563b2cfd3aa60d389f7ab0bb1c8eebb797c30794ce5da168450961e9f31dc84a99
SHA5128502453c6a86c710a39a6bfa5e426917ef1c129d2a4e03ff27128f8842a3e0e546e07d364152dabcefa118992f071917bb80ae2fdf6b0513647d6d81c69168bf