Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 03:16 UTC

General

  • Target

    c251d1c4d6f183849b41909b8de994e3.exe

  • Size

    1000KB

  • MD5

    c251d1c4d6f183849b41909b8de994e3

  • SHA1

    9e98790e5184ac5405fc5ab10337cd9788713281

  • SHA256

    6d411677b1ec373f35908afc97c9a936ad404bb043872cd58f861e58736085ba

  • SHA512

    d726e2968f0f698abfa5b21e57154aab736a656d3b476d5b94f50532d790927a8a264e559cde746bd8bf291e0e971d77857ab8541917075e2ae28affe0ec62a9

  • SSDEEP

    24576:zfxngE6B1XuI2jlMVyX8tv1B+5vMiqt0gj2ed:zfxQ1XuhlMEsVqOL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c251d1c4d6f183849b41909b8de994e3.exe
    "C:\Users\Admin\AppData\Local\Temp\c251d1c4d6f183849b41909b8de994e3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\c251d1c4d6f183849b41909b8de994e3.exe
      C:\Users\Admin\AppData\Local\Temp\c251d1c4d6f183849b41909b8de994e3.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c251d1c4d6f183849b41909b8de994e3.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:2716

Network

  • flag-us
    DNS
    www.gP7CLxSj1n.com
    c251d1c4d6f183849b41909b8de994e3.exe
    Remote address:
    8.8.8.8:53
    Request
    www.gP7CLxSj1n.com
    IN A
    Response
  • flag-us
    DNS
    www.gP7CLxSj1n.com
    c251d1c4d6f183849b41909b8de994e3.exe
    Remote address:
    8.8.8.8:53
    Request
    www.gP7CLxSj1n.com
    IN A
  • flag-us
    DNS
    www.gP7CLxSj1n.com
    c251d1c4d6f183849b41909b8de994e3.exe
    Remote address:
    8.8.8.8:53
    Request
    www.gP7CLxSj1n.com
    IN A
  • flag-us
    DNS
    w.google.com
    c251d1c4d6f183849b41909b8de994e3.exe
    Remote address:
    8.8.8.8:53
    Request
    w.google.com
    IN A
    Response
    w.google.com
    IN CNAME
    www3.l.google.com
    www3.l.google.com
    IN A
    142.250.179.206
  • flag-us
    DNS
    w.google.com
    c251d1c4d6f183849b41909b8de994e3.exe
    Remote address:
    8.8.8.8:53
    Request
    w.google.com
    IN A
  • flag-nl
    GET
    http://w.google.com/
    c251d1c4d6f183849b41909b8de994e3.exe
    Remote address:
    142.250.179.206:80
    Request
    GET / HTTP/1.1
    Cache-Control: no-cache
    Connection: Keep-Alive
    Pragma: no-cache
    Accept: */*, ???@, ??????????????
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: w.google.com
    Response
    HTTP/1.1 404 Not Found
    Content-Type: text/html; charset=UTF-8
    Referrer-Policy: no-referrer
    Content-Length: 1561
    Date: Tue, 12 Mar 2024 03:16:45 GMT
  • flag-us
    DNS
    pastebin.com
    c251d1c4d6f183849b41909b8de994e3.exe
    Remote address:
    8.8.8.8:53
    Request
    pastebin.com
    IN A
    Response
    pastebin.com
    IN A
    104.20.67.143
    pastebin.com
    IN A
    172.67.34.170
    pastebin.com
    IN A
    104.20.68.143
  • flag-us
    GET
    http://pastebin.com/raw/ubFNTPjt
    c251d1c4d6f183849b41909b8de994e3.exe
    Remote address:
    104.20.67.143:80
    Request
    GET /raw/ubFNTPjt HTTP/1.1
    Cache-Control: no-cache
    Connection: Keep-Alive
    Pragma: no-cache
    Accept: */*, ???@, ??????????????
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: pastebin.com
    Response
    HTTP/1.1 301 Moved Permanently
    Date: Tue, 12 Mar 2024 03:16:46 GMT
    Transfer-Encoding: chunked
    Connection: keep-alive
    Cache-Control: max-age=3600
    Expires: Tue, 12 Mar 2024 04:16:46 GMT
    Location: https://pastebin.com/raw/ubFNTPjt
    Server: cloudflare
    CF-RAY: 8630a09b8872dcc7-LHR
  • flag-us
    GET
    https://pastebin.com/raw/ubFNTPjt
    c251d1c4d6f183849b41909b8de994e3.exe
    Remote address:
    104.20.67.143:443
    Request
    GET /raw/ubFNTPjt HTTP/1.1
    Cache-Control: no-cache
    Connection: Keep-Alive
    Pragma: no-cache
    Accept: */*, ???@, ??????????????
    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
    Host: pastebin.com
    Response
    HTTP/1.1 404 Not Found
    Date: Tue, 12 Mar 2024 03:16:47 GMT
    Content-Type: text/html; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
    x-frame-options: DENY
    x-frame-options: DENY
    x-content-type-options: nosniff
    x-content-type-options: nosniff
    x-xss-protection: 1;mode=block
    x-xss-protection: 1;mode=block
    cache-control: public, max-age=1801
    CF-Cache-Status: HIT
    Age: 305
    Server: cloudflare
    CF-RAY: 8630a0a64a2a6340-LHR
  • 142.250.179.206:80
    http://w.google.com/
    http
    c251d1c4d6f183849b41909b8de994e3.exe
    462 B
    1.9kB
    5
    4

    HTTP Request

    GET http://w.google.com/

    HTTP Response

    404
  • 104.20.67.143:80
    http://pastebin.com/raw/ubFNTPjt
    http
    c251d1c4d6f183849b41909b8de994e3.exe
    474 B
    424 B
    5
    3

    HTTP Request

    GET http://pastebin.com/raw/ubFNTPjt

    HTTP Response

    301
  • 104.20.67.143:443
    https://pastebin.com/raw/ubFNTPjt
    tls, http
    c251d1c4d6f183849b41909b8de994e3.exe
    1.2kB
    5.8kB
    12
    10

    HTTP Request

    GET https://pastebin.com/raw/ubFNTPjt

    HTTP Response

    404
  • 8.8.8.8:53
    www.gP7CLxSj1n.com
    dns
    c251d1c4d6f183849b41909b8de994e3.exe
    192 B
    137 B
    3
    1

    DNS Request

    www.gP7CLxSj1n.com

    DNS Request

    www.gP7CLxSj1n.com

    DNS Request

    www.gP7CLxSj1n.com

  • 8.8.8.8:53
    w.google.com
    dns
    c251d1c4d6f183849b41909b8de994e3.exe
    116 B
    95 B
    2
    1

    DNS Request

    w.google.com

    DNS Request

    w.google.com

    DNS Response

    142.250.179.206

  • 8.8.8.8:53
    pastebin.com
    dns
    c251d1c4d6f183849b41909b8de994e3.exe
    58 B
    106 B
    1
    1

    DNS Request

    pastebin.com

    DNS Response

    104.20.67.143
    172.67.34.170
    104.20.68.143

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    67KB

    MD5

    753df6889fd7410a2e9fe333da83a429

    SHA1

    3c425f16e8267186061dd48ac1c77c122962456e

    SHA256

    b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

    SHA512

    9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

  • C:\Users\Admin\AppData\Local\Temp\Tar2CF1.tmp

    Filesize

    175KB

    MD5

    dd73cead4b93366cf3465c8cd32e2796

    SHA1

    74546226dfe9ceb8184651e920d1dbfb432b314e

    SHA256

    a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

    SHA512

    ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

  • \Users\Admin\AppData\Local\Temp\c251d1c4d6f183849b41909b8de994e3.exe

    Filesize

    1000KB

    MD5

    8ff40ff18fd05782163f6a5b1d06b16f

    SHA1

    3899851ee45fbb6c9cc2489ffd5c26bbe8b80fa8

    SHA256

    cd2961c8c873d5a882551f77edddf294d2864aa1994013d039410e889668749e

    SHA512

    e26cf02eed4fc2c5671021b586f8937feb32294325036bdcc78bd678412bde820ca6135e47e33909c1f306623a8fd0c493f7aadfedc53d8d0805b83ab2364d6b

  • memory/2088-1-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2088-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2088-3-0x00000000001A0000-0x0000000000223000-memory.dmp

    Filesize

    524KB

  • memory/2088-14-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/3020-16-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/3020-18-0x0000000000250000-0x00000000002D3000-memory.dmp

    Filesize

    524KB

  • memory/3020-23-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3020-28-0x0000000002DD0000-0x0000000002E4E000-memory.dmp

    Filesize

    504KB

  • memory/3020-67-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.