Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-03-2024 14:30

General

  • Target

    c8d97170de82cbbe596fe6ae9142e5c9.exe

  • Size

    1000KB

  • MD5

    c8d97170de82cbbe596fe6ae9142e5c9

  • SHA1

    137c3d033cd79c5445e226180e9a6073f155fa45

  • SHA256

    9913d5b732880ddc359afdeaf20c65bfb85e4a1518883435ee4ba5ce30e96652

  • SHA512

    7b0a99706d307ea5a4241b3e91d80b51b5c9789a4cfb9e372b390ac6ab37415a7383eaeeaa045a7c4e4ae444d43f69c8af502ab562924c07f1655ae8506cd3ce

  • SSDEEP

    12288:SgUvWbGd65WxY8jXZsHob+z212o8rINHCKz6jECaBwQ2tb5JLrnylUPqt0gHDS7O:S9W6d4zo+GQINi26Y1B+5vMiqt0gj2ed

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8d97170de82cbbe596fe6ae9142e5c9.exe
    "C:\Users\Admin\AppData\Local\Temp\c8d97170de82cbbe596fe6ae9142e5c9.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\c8d97170de82cbbe596fe6ae9142e5c9.exe
      C:\Users\Admin\AppData\Local\Temp\c8d97170de82cbbe596fe6ae9142e5c9.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\c8d97170de82cbbe596fe6ae9142e5c9.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:1500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\c8d97170de82cbbe596fe6ae9142e5c9.exe

    Filesize

    1000KB

    MD5

    d577a8306372c3ee35ec42641ef3b641

    SHA1

    2d77e6a54cc5c753e7844914b77b9cd9c2e1ce0f

    SHA256

    74793727823fa55b8a1d6a283fd63e987518fe6b10da1d9e34ad5bb5c2b4381b

    SHA512

    801dbe0e505f793a3fca7c0f2d368d1e40653e86ec67de446013fac2fbc0ee11b3c41a004e7a07dc0d50186a9fe88d5c055722c6aace5bac93b68317b6bc3f98

  • memory/944-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/944-1-0x0000000001680000-0x0000000001703000-memory.dmp

    Filesize

    524KB

  • memory/944-2-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/944-11-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/3944-13-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/3944-14-0x00000000016A0000-0x0000000001723000-memory.dmp

    Filesize

    524KB

  • memory/3944-20-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/3944-22-0x0000000004F80000-0x0000000004FFE000-memory.dmp

    Filesize

    504KB

  • memory/3944-27-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB