Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 19:26
Static task
static1
Behavioral task
behavioral1
Sample
bc9b9093489f6a6292c8edfcaf0908ab.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bc9b9093489f6a6292c8edfcaf0908ab.exe
Resource
win10v2004-20240226-en
General
-
Target
bc9b9093489f6a6292c8edfcaf0908ab.exe
-
Size
506KB
-
MD5
bc9b9093489f6a6292c8edfcaf0908ab
-
SHA1
62a2766a15240b35468a9bb2a07c038cabd79211
-
SHA256
0ca1e7720246580da172fae6377d94b41977600ff3accf828e97d955a526223d
-
SHA512
86c55a56bfde54c8ad198f364820f00c229472d29408b3c236c90fb91efdfffff86c7ade75b5c7b872888cf401dbaf216ae49d11c068d0b8379d28468b8a8681
-
SSDEEP
6144:YY2XMWX6Oy40yb+umyyzVZnNEawns1KPmcoLP1Q8wp492nwK1FZ5kFp5aRNlK5:YjMWX6O10ypmHZNELsYAHJ98PUaRvK5
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3656 bc9b9093489f6a6292c8edfcaf0908ab.exe -
Executes dropped EXE 1 IoCs
pid Process 3656 bc9b9093489f6a6292c8edfcaf0908ab.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 pastebin.com 25 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3656 bc9b9093489f6a6292c8edfcaf0908ab.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3000 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3656 bc9b9093489f6a6292c8edfcaf0908ab.exe 3656 bc9b9093489f6a6292c8edfcaf0908ab.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4084 bc9b9093489f6a6292c8edfcaf0908ab.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4084 bc9b9093489f6a6292c8edfcaf0908ab.exe 3656 bc9b9093489f6a6292c8edfcaf0908ab.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4084 wrote to memory of 3656 4084 bc9b9093489f6a6292c8edfcaf0908ab.exe 88 PID 4084 wrote to memory of 3656 4084 bc9b9093489f6a6292c8edfcaf0908ab.exe 88 PID 4084 wrote to memory of 3656 4084 bc9b9093489f6a6292c8edfcaf0908ab.exe 88 PID 3656 wrote to memory of 3000 3656 bc9b9093489f6a6292c8edfcaf0908ab.exe 91 PID 3656 wrote to memory of 3000 3656 bc9b9093489f6a6292c8edfcaf0908ab.exe 91 PID 3656 wrote to memory of 3000 3656 bc9b9093489f6a6292c8edfcaf0908ab.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc9b9093489f6a6292c8edfcaf0908ab.exe"C:\Users\Admin\AppData\Local\Temp\bc9b9093489f6a6292c8edfcaf0908ab.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\bc9b9093489f6a6292c8edfcaf0908ab.exeC:\Users\Admin\AppData\Local\Temp\bc9b9093489f6a6292c8edfcaf0908ab.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\bc9b9093489f6a6292c8edfcaf0908ab.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5f15201f248c69f317d28ff013907c648
SHA11b757d5beb7016cf27f52acd744c4e6d5ec4c4ff
SHA256eca33176bd2fb55349e7718b2fb9f8869168bddb8ba71082d1b01176a708d0c8
SHA512b4a9cb02fa1a62fc7ff93972f3ad924e85f98684262de848bb000cc3ba8d818c8cbf3673e8aaac3a5fa22ac657fa2f95f0e6aa416f8ca06d1312adcff0514e47