Analysis
-
max time kernel
121s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
c520349908f67551c04037f788c5b934.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c520349908f67551c04037f788c5b934.exe
Resource
win10v2004-20240226-en
General
-
Target
c520349908f67551c04037f788c5b934.exe
-
Size
1000KB
-
MD5
c520349908f67551c04037f788c5b934
-
SHA1
841964e649852fa9eb60fd7bc5e204e98883cec7
-
SHA256
b37659011171b0c60c0dcb2c10d25da30364a6182efde5f1482db5e218bdbc21
-
SHA512
18538ac602ff0e4d084329f8bea6fa1ffe3c57251722be0969ea07b5368be4c15d02cfcd19b9945c1f215983ae2435bf2f0fde5bf7c97092aa3cce10c2322913
-
SSDEEP
24576:Vciwmc4A7Yt0OCn/LCXoaAuLWhD1B+5vMiqt0gj2ed:VEL4h9WOXehrqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1128 c520349908f67551c04037f788c5b934.exe -
Executes dropped EXE 1 IoCs
pid Process 1128 c520349908f67551c04037f788c5b934.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 33 pastebin.com 37 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1128 c520349908f67551c04037f788c5b934.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1212 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1128 c520349908f67551c04037f788c5b934.exe 1128 c520349908f67551c04037f788c5b934.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 948 c520349908f67551c04037f788c5b934.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 948 c520349908f67551c04037f788c5b934.exe 1128 c520349908f67551c04037f788c5b934.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 948 wrote to memory of 1128 948 c520349908f67551c04037f788c5b934.exe 99 PID 948 wrote to memory of 1128 948 c520349908f67551c04037f788c5b934.exe 99 PID 948 wrote to memory of 1128 948 c520349908f67551c04037f788c5b934.exe 99 PID 1128 wrote to memory of 1212 1128 c520349908f67551c04037f788c5b934.exe 101 PID 1128 wrote to memory of 1212 1128 c520349908f67551c04037f788c5b934.exe 101 PID 1128 wrote to memory of 1212 1128 c520349908f67551c04037f788c5b934.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c520349908f67551c04037f788c5b934.exe"C:\Users\Admin\AppData\Local\Temp\c520349908f67551c04037f788c5b934.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\c520349908f67551c04037f788c5b934.exeC:\Users\Admin\AppData\Local\Temp\c520349908f67551c04037f788c5b934.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c520349908f67551c04037f788c5b934.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1212
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3692 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:1336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5e007b001463375e476a81250c33bf116
SHA156aaceca42c722619a272fcc70ce9d3d4795532b
SHA2564b5535a43da8eb9b3563224829ef9cea424eb6bb037f258375333667aee3cc2a
SHA5122612f23be9427c0dfd328c8fbeca7af2ba94ba1f41a759919f76bda153a03501e92ca677b995fc76ee83a10a04b34b05913fcc6dc2dd46326d8ffc93c10a0238