Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-03-2024 15:20

General

  • Target

    b7b9fc2fde0f4ab6c8b266843d3fb165.exe

  • Size

    1000KB

  • MD5

    b7b9fc2fde0f4ab6c8b266843d3fb165

  • SHA1

    fdf582af0eb2fd080b52ecc49951f01e60cbf51f

  • SHA256

    13150b9ce23b391b7ade1da8ee86b5dfe0ca6a5b1033f0ea2167a93ef11d5b7d

  • SHA512

    21aaa76a11d1578007d45b68a6d70a6514a6fb1d32e3d8983fba537a9e19b196d0ee50bdaa62dce8cd1b082551d46bcc1552280b7a56b7be064d7b71704acb32

  • SSDEEP

    24576:Sd9s7FRyu3YZP+92sCgmZ1B+5vMiqt0gj2ed:D1YZP+sXqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7b9fc2fde0f4ab6c8b266843d3fb165.exe
    "C:\Users\Admin\AppData\Local\Temp\b7b9fc2fde0f4ab6c8b266843d3fb165.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\b7b9fc2fde0f4ab6c8b266843d3fb165.exe
      C:\Users\Admin\AppData\Local\Temp\b7b9fc2fde0f4ab6c8b266843d3fb165.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\b7b9fc2fde0f4ab6c8b266843d3fb165.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\Local\Temp\TarA5E7.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\b7b9fc2fde0f4ab6c8b266843d3fb165.exe

    Filesize

    1000KB

    MD5

    ae1c1e93982931264aff6e2881dee6c5

    SHA1

    595d48c9c0b51ccb50ac7e3e4a9fe9d368ad4091

    SHA256

    1af7a2a4cb54e9442a6170abbde818aa0f453bbe62ffaadfea532f0ff9bbb7eb

    SHA512

    33bc4ef8a2bc666d9d83065c1b871e2ee493d077bed7c1c39310dd866dc74b891f9a8d10fa5bf33e79d35f324e183e29fda6a73a93d619a41c512664ae223136

  • memory/2240-1-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2240-3-0x00000000001A0000-0x0000000000223000-memory.dmp

    Filesize

    524KB

  • memory/2240-14-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2240-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2240-15-0x0000000002E10000-0x0000000002E93000-memory.dmp

    Filesize

    524KB

  • memory/2636-17-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2636-24-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2636-26-0x0000000002D30000-0x0000000002DAE000-memory.dmp

    Filesize

    504KB

  • memory/2636-18-0x0000000000370000-0x00000000003F3000-memory.dmp

    Filesize

    524KB

  • memory/2636-68-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB