Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 14:56
Static task
static1
Behavioral task
behavioral1
Sample
ac287a911cbb2a767f1b20bd63066bca.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ac287a911cbb2a767f1b20bd63066bca.exe
Resource
win10v2004-20240226-en
General
-
Target
ac287a911cbb2a767f1b20bd63066bca.exe
-
Size
1000KB
-
MD5
ac287a911cbb2a767f1b20bd63066bca
-
SHA1
c4117f3b79dbe1b67044b125e199c1de91f87c7d
-
SHA256
eb30de221302551c1e2f820bed22c7dc2bfe6b38e54954d97c2454219f8a9f27
-
SHA512
b9b884192913ce63f2857f2f5e90b95072449f5b8e0badff24164ccb9072235efee00f70a94128e35d4968a9d3003105f10f39033f012f2a0d52898a261cf6e6
-
SSDEEP
24576:ABLN+8LlhbP1sWwYxHyC/b/zYb1B+5vMiqt0gj2ed:ABLN+o/bP/wY7KqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4372 ac287a911cbb2a767f1b20bd63066bca.exe -
Executes dropped EXE 1 IoCs
pid Process 4372 ac287a911cbb2a767f1b20bd63066bca.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 pastebin.com 24 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4372 ac287a911cbb2a767f1b20bd63066bca.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 64 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4372 ac287a911cbb2a767f1b20bd63066bca.exe 4372 ac287a911cbb2a767f1b20bd63066bca.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1796 ac287a911cbb2a767f1b20bd63066bca.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1796 ac287a911cbb2a767f1b20bd63066bca.exe 4372 ac287a911cbb2a767f1b20bd63066bca.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1796 wrote to memory of 4372 1796 ac287a911cbb2a767f1b20bd63066bca.exe 88 PID 1796 wrote to memory of 4372 1796 ac287a911cbb2a767f1b20bd63066bca.exe 88 PID 1796 wrote to memory of 4372 1796 ac287a911cbb2a767f1b20bd63066bca.exe 88 PID 4372 wrote to memory of 64 4372 ac287a911cbb2a767f1b20bd63066bca.exe 91 PID 4372 wrote to memory of 64 4372 ac287a911cbb2a767f1b20bd63066bca.exe 91 PID 4372 wrote to memory of 64 4372 ac287a911cbb2a767f1b20bd63066bca.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac287a911cbb2a767f1b20bd63066bca.exe"C:\Users\Admin\AppData\Local\Temp\ac287a911cbb2a767f1b20bd63066bca.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\ac287a911cbb2a767f1b20bd63066bca.exeC:\Users\Admin\AppData\Local\Temp\ac287a911cbb2a767f1b20bd63066bca.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\ac287a911cbb2a767f1b20bd63066bca.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:64
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5e0ba0fd1ba493cc3d6c8828b9cbfa65e
SHA170e83f31c2921d412edf8cc42989895a0b58951c
SHA256a79ffb2eb0ebc7320f41677e80c1cd8da8c6e41ccdcf0d4f4d8af4e390bab8a3
SHA512518d4ebdcff826375bfe2d79d943913c719462b635f437a4f63888413cc4618e84c2663b1cfb01bfad0e98780b6e6407aeb3a98cd0b6f322ad8c0a89add5f72f