Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 07:13
Static task
static1
Behavioral task
behavioral1
Sample
d5845a033c4254bdce1141318d48350d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d5845a033c4254bdce1141318d48350d.exe
Resource
win10v2004-20240226-en
General
-
Target
d5845a033c4254bdce1141318d48350d.exe
-
Size
506KB
-
MD5
d5845a033c4254bdce1141318d48350d
-
SHA1
877113bf0eea35951d87e3cf9ad24be0ec6c9c26
-
SHA256
e8b136e2e9eb0f94846032d82c0ef68c864da926c71a13393fad32a3ec019816
-
SHA512
0b6fd8bd7be5c9538f0f60e84c4ca9a393cc8aca17f12659359d0f19f37fa281c70323acff98bfce521c6de144db37a92c37d1b3e398324520479a985b733353
-
SSDEEP
12288:EAqmUM5f5sw+4payI84/nLPzTNm/jsQ0QaaoTKh:pUY5sw+VyPMbNm/j/jiKh
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2692 d5845a033c4254bdce1141318d48350d.exe -
Executes dropped EXE 1 IoCs
pid Process 2692 d5845a033c4254bdce1141318d48350d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 pastebin.com 16 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2692 d5845a033c4254bdce1141318d48350d.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3884 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 d5845a033c4254bdce1141318d48350d.exe 2692 d5845a033c4254bdce1141318d48350d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1136 d5845a033c4254bdce1141318d48350d.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1136 d5845a033c4254bdce1141318d48350d.exe 2692 d5845a033c4254bdce1141318d48350d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1136 wrote to memory of 2692 1136 d5845a033c4254bdce1141318d48350d.exe 87 PID 1136 wrote to memory of 2692 1136 d5845a033c4254bdce1141318d48350d.exe 87 PID 1136 wrote to memory of 2692 1136 d5845a033c4254bdce1141318d48350d.exe 87 PID 2692 wrote to memory of 3884 2692 d5845a033c4254bdce1141318d48350d.exe 89 PID 2692 wrote to memory of 3884 2692 d5845a033c4254bdce1141318d48350d.exe 89 PID 2692 wrote to memory of 3884 2692 d5845a033c4254bdce1141318d48350d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5845a033c4254bdce1141318d48350d.exe"C:\Users\Admin\AppData\Local\Temp\d5845a033c4254bdce1141318d48350d.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\d5845a033c4254bdce1141318d48350d.exeC:\Users\Admin\AppData\Local\Temp\d5845a033c4254bdce1141318d48350d.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\d5845a033c4254bdce1141318d48350d.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:3884
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5ebbd802f510fc0af87b157501ba17684
SHA1f34a4737877116ee34ec48cb62271a2bf58aeb3d
SHA256ccb449ef3ac2d13ec6de51fb2ade887a96e02538869f0e086681cda804f41e6b
SHA51264c8e70c79477d0eaaf634b2c727aa149f1b03258419dd267ca8638e549628673a1081ac2f7e173011c186031aa470941798b8ef4b135e722635de770b3405a8