Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
e043c98e2882e8f3083e79f20389f11c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e043c98e2882e8f3083e79f20389f11c.exe
Resource
win10v2004-20240226-en
General
-
Target
e043c98e2882e8f3083e79f20389f11c.exe
-
Size
1000KB
-
MD5
e043c98e2882e8f3083e79f20389f11c
-
SHA1
ecfa4299d184466846cd931f5af3e7546fd6a71b
-
SHA256
eff9c7b20f885825eda37388d1c21d7209cd0a4b83d62d956fc9a5429b470e6e
-
SHA512
f5bd100dd4fa08e8c8dd29e7ee29a7f9d8f64c78d92d6241444c440c506377db2afef431be030679c67ddeb8e76a743ff8bb92857dccb80a49589274531e2be5
-
SSDEEP
24576:HFzxPqt1PISah1YWRsA7phIt6RYScYTpiQX1B+5vMiqt0gj2ed:HfvjrRvIt627QnqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2960 e043c98e2882e8f3083e79f20389f11c.exe -
Executes dropped EXE 1 IoCs
pid Process 2960 e043c98e2882e8f3083e79f20389f11c.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 e043c98e2882e8f3083e79f20389f11c.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 7 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2960 e043c98e2882e8f3083e79f20389f11c.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2960 e043c98e2882e8f3083e79f20389f11c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2156 e043c98e2882e8f3083e79f20389f11c.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2156 e043c98e2882e8f3083e79f20389f11c.exe 2960 e043c98e2882e8f3083e79f20389f11c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2960 2156 e043c98e2882e8f3083e79f20389f11c.exe 28 PID 2156 wrote to memory of 2960 2156 e043c98e2882e8f3083e79f20389f11c.exe 28 PID 2156 wrote to memory of 2960 2156 e043c98e2882e8f3083e79f20389f11c.exe 28 PID 2156 wrote to memory of 2960 2156 e043c98e2882e8f3083e79f20389f11c.exe 28 PID 2960 wrote to memory of 2816 2960 e043c98e2882e8f3083e79f20389f11c.exe 29 PID 2960 wrote to memory of 2816 2960 e043c98e2882e8f3083e79f20389f11c.exe 29 PID 2960 wrote to memory of 2816 2960 e043c98e2882e8f3083e79f20389f11c.exe 29 PID 2960 wrote to memory of 2816 2960 e043c98e2882e8f3083e79f20389f11c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e043c98e2882e8f3083e79f20389f11c.exe"C:\Users\Admin\AppData\Local\Temp\e043c98e2882e8f3083e79f20389f11c.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\e043c98e2882e8f3083e79f20389f11c.exeC:\Users\Admin\AppData\Local\Temp\e043c98e2882e8f3083e79f20389f11c.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e043c98e2882e8f3083e79f20389f11c.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
1000KB
MD5eb51dfa1c51c0d398639b9b3e16eeb6e
SHA1412fcb5bbf9df666ecb2da04aee79c62d227ae56
SHA25664ca24e3d090858788c5d721659df20cf7dba956cafd1c239fc9c423dcec054a
SHA51232593162a2e1e9c85c46ff31cf39ef5e863a1343f5e54050a37906550ca022e3d17dddd86403885440e85d363a9252ca5a554c3a66f7537fb38af726f976fc49
-
Filesize
512KB
MD55ab72db32bdfa583b04663edd6d7b7e9
SHA1366207841fa832203e6ffad60d99558c5f08c3dc
SHA256087467275df64746f9905bca57253eca4c5a032f338b6e0aa400d9f0f8eadd33
SHA51243c96c6e1a28ec96ca113861ed2bde11642b9827962bdc2bcbb2e9ad849f764f921f010d03e46380bd117ebffca662df619d5e0809a4b4c8c38b59002db4c06d