Analysis
-
max time kernel
92s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
c870808aa7673b66364058da73fb2307.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c870808aa7673b66364058da73fb2307.exe
Resource
win10v2004-20231215-en
General
-
Target
c870808aa7673b66364058da73fb2307.exe
-
Size
506KB
-
MD5
c870808aa7673b66364058da73fb2307
-
SHA1
ed65839ad8fa0948e169176144ee0ed322a02276
-
SHA256
bae00b778d6cf7e8c2c7b65b6fb23a439b7ba76439108a46f936bfcb2278bbc3
-
SHA512
e7a9a5ec5ae9ac0fe110efd4fa2c93e6743cf40442faf02892a779b95e4154059d6e165b2f611c5faaab18eecdd584be29af0c866f6b5f038281d45c6f6f5c96
-
SSDEEP
12288:brP5soR7JdBEzQMko7CL3gazDU0BSUcEa9JBorx:bjjtadkD0MUCcTs1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4232 c870808aa7673b66364058da73fb2307.exe -
Executes dropped EXE 1 IoCs
pid Process 4232 c870808aa7673b66364058da73fb2307.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 15 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4232 c870808aa7673b66364058da73fb2307.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4232 c870808aa7673b66364058da73fb2307.exe 4232 c870808aa7673b66364058da73fb2307.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4788 c870808aa7673b66364058da73fb2307.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4788 c870808aa7673b66364058da73fb2307.exe 4232 c870808aa7673b66364058da73fb2307.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4788 wrote to memory of 4232 4788 c870808aa7673b66364058da73fb2307.exe 85 PID 4788 wrote to memory of 4232 4788 c870808aa7673b66364058da73fb2307.exe 85 PID 4788 wrote to memory of 4232 4788 c870808aa7673b66364058da73fb2307.exe 85 PID 4232 wrote to memory of 5028 4232 c870808aa7673b66364058da73fb2307.exe 86 PID 4232 wrote to memory of 5028 4232 c870808aa7673b66364058da73fb2307.exe 86 PID 4232 wrote to memory of 5028 4232 c870808aa7673b66364058da73fb2307.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c870808aa7673b66364058da73fb2307.exe"C:\Users\Admin\AppData\Local\Temp\c870808aa7673b66364058da73fb2307.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\c870808aa7673b66364058da73fb2307.exeC:\Users\Admin\AppData\Local\Temp\c870808aa7673b66364058da73fb2307.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c870808aa7673b66364058da73fb2307.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:5028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD56113a222a30c98512c4a7f6898ee0514
SHA1a9b474cdb5959b90f8e7dc713d6607e70960a3e8
SHA256aa74308410614f5256ff4c0d2250f855654a2d32704abe9efdd272692ed01e4e
SHA5120874052b6236276b0048052b93890776af704cfb73f44b2be15103e082f2659adabc90e4b6b7c48753360d09200a46826572a1b8c65a6064440eed97aba7c074