Analysis
-
max time kernel
147s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
c9f16d098a3c48c0a077fc80029f699a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c9f16d098a3c48c0a077fc80029f699a.exe
Resource
win10v2004-20240226-en
General
-
Target
c9f16d098a3c48c0a077fc80029f699a.exe
-
Size
1000KB
-
MD5
c9f16d098a3c48c0a077fc80029f699a
-
SHA1
9b9c7bae554bb4b1ed6f33c0aed1682786944206
-
SHA256
10025ab367879213268318d16fbeadbdf18c04a22e3f54646b93e48e2c9e4c10
-
SHA512
c27bc226effc3d910aacb6d3923f03acfdd20f59af6901975e8ca9053b06101f3449990a6b0b55c852ab4db671afff35aeae93626566b4de2a441ded7a8c47ec
-
SSDEEP
24576:A4eqycHbAx7sHYoxtxH5upaNV1B+5vMiqt0gj2ed:9ef7sHYoxru8qOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 948 c9f16d098a3c48c0a077fc80029f699a.exe -
Executes dropped EXE 1 IoCs
pid Process 948 c9f16d098a3c48c0a077fc80029f699a.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 29 pastebin.com 33 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 948 c9f16d098a3c48c0a077fc80029f699a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 948 c9f16d098a3c48c0a077fc80029f699a.exe 948 c9f16d098a3c48c0a077fc80029f699a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4044 c9f16d098a3c48c0a077fc80029f699a.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4044 c9f16d098a3c48c0a077fc80029f699a.exe 948 c9f16d098a3c48c0a077fc80029f699a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4044 wrote to memory of 948 4044 c9f16d098a3c48c0a077fc80029f699a.exe 90 PID 4044 wrote to memory of 948 4044 c9f16d098a3c48c0a077fc80029f699a.exe 90 PID 4044 wrote to memory of 948 4044 c9f16d098a3c48c0a077fc80029f699a.exe 90 PID 948 wrote to memory of 2052 948 c9f16d098a3c48c0a077fc80029f699a.exe 91 PID 948 wrote to memory of 2052 948 c9f16d098a3c48c0a077fc80029f699a.exe 91 PID 948 wrote to memory of 2052 948 c9f16d098a3c48c0a077fc80029f699a.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9f16d098a3c48c0a077fc80029f699a.exe"C:\Users\Admin\AppData\Local\Temp\c9f16d098a3c48c0a077fc80029f699a.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\c9f16d098a3c48c0a077fc80029f699a.exeC:\Users\Admin\AppData\Local\Temp\c9f16d098a3c48c0a077fc80029f699a.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c9f16d098a3c48c0a077fc80029f699a.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5275c4efd1ec7d9da0884a3010e113c82
SHA152cd745ac93994cb159782bb4b95fd9731a87e04
SHA256f4e44ac396fc2ef430660ac3377ef35ef45497354c927faca0fbeee5ad37fb1e
SHA5121792d86cae888163b64de666729df3a21456a55074293169983ee8b9988df5a2bc3f5ee18910fd5d2be080547f6333e320b97a59a13726c47acdbb50566d7895