Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
bf8582364d7d4cf62799449607cd8a74.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf8582364d7d4cf62799449607cd8a74.exe
Resource
win10v2004-20240226-en
General
-
Target
bf8582364d7d4cf62799449607cd8a74.exe
-
Size
506KB
-
MD5
bf8582364d7d4cf62799449607cd8a74
-
SHA1
809291c67f7174bd23470143ceb2911dc90bed74
-
SHA256
7d63158be71001e2dac9431bff6301adb281357727d9938e7def1930d4b582f0
-
SHA512
b54868d2417ee27d58d1bf6263d73085ac0beb40d4728082692c1cb4a918d66d68b57702d5da13082e6b4a553602fc8e64bfac100f89ee07810e8abdb8eacb0a
-
SSDEEP
12288:Cw4YLHVOxs/UALbqzs5DgiwbNr4m+AKvpesXYF4d:bQxzAPq9d41pWE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1776 bf8582364d7d4cf62799449607cd8a74.exe -
Executes dropped EXE 1 IoCs
pid Process 1776 bf8582364d7d4cf62799449607cd8a74.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 pastebin.com 19 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1776 bf8582364d7d4cf62799449607cd8a74.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4552 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1776 bf8582364d7d4cf62799449607cd8a74.exe 1776 bf8582364d7d4cf62799449607cd8a74.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4916 bf8582364d7d4cf62799449607cd8a74.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4916 bf8582364d7d4cf62799449607cd8a74.exe 1776 bf8582364d7d4cf62799449607cd8a74.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4916 wrote to memory of 1776 4916 bf8582364d7d4cf62799449607cd8a74.exe 88 PID 4916 wrote to memory of 1776 4916 bf8582364d7d4cf62799449607cd8a74.exe 88 PID 4916 wrote to memory of 1776 4916 bf8582364d7d4cf62799449607cd8a74.exe 88 PID 1776 wrote to memory of 4552 1776 bf8582364d7d4cf62799449607cd8a74.exe 91 PID 1776 wrote to memory of 4552 1776 bf8582364d7d4cf62799449607cd8a74.exe 91 PID 1776 wrote to memory of 4552 1776 bf8582364d7d4cf62799449607cd8a74.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf8582364d7d4cf62799449607cd8a74.exe"C:\Users\Admin\AppData\Local\Temp\bf8582364d7d4cf62799449607cd8a74.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\bf8582364d7d4cf62799449607cd8a74.exeC:\Users\Admin\AppData\Local\Temp\bf8582364d7d4cf62799449607cd8a74.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\bf8582364d7d4cf62799449607cd8a74.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:4552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD53a1a59c7759d79e7a8849d9fba2cbbad
SHA1da4ae14501be716503b8bbd9d7542271501ad122
SHA25638837f9f77f077a2869b8612507d5642c77738e1ad247b4958ba137330bb2d19
SHA512f1b8813478bdbc9b8b96141edb6b9294d64c88edfee3c6263c90f599bff576172a7b1cc8f9107ba0c248777f56505f646030c92dcd8a486cd62d36ca06ef5388