Analysis
-
max time kernel
143s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 15:41
Static task
static1
Behavioral task
behavioral1
Sample
e205e8cf80a03357f2fe15197b9890a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e205e8cf80a03357f2fe15197b9890a2.exe
Resource
win10v2004-20240319-en
General
-
Target
e205e8cf80a03357f2fe15197b9890a2.exe
-
Size
1000KB
-
MD5
e205e8cf80a03357f2fe15197b9890a2
-
SHA1
346dfc9ee528d36602621b56797c092188cdccaf
-
SHA256
b265937cf5622551c7c18b4008c0177c5e9386ecc3356f6240d160461255630f
-
SHA512
9bb8d3b44f8d5302b799d2a72a4be3e4dad8a5a3ef0d2233338653276366fe82a426c90b6306cae2d8f25653f921fd42696a722c7cd94c3f99f54c6dd813a922
-
SSDEEP
24576:EbIeZBuGjztZTMe7zWEv1B+5vMiqt0gj2ed:HeigZTMCLqOL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3620 e205e8cf80a03357f2fe15197b9890a2.exe -
Executes dropped EXE 1 IoCs
pid Process 3620 e205e8cf80a03357f2fe15197b9890a2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 28 pastebin.com 23 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3620 e205e8cf80a03357f2fe15197b9890a2.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3620 e205e8cf80a03357f2fe15197b9890a2.exe 3620 e205e8cf80a03357f2fe15197b9890a2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4780 e205e8cf80a03357f2fe15197b9890a2.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4780 e205e8cf80a03357f2fe15197b9890a2.exe 3620 e205e8cf80a03357f2fe15197b9890a2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4780 wrote to memory of 3620 4780 e205e8cf80a03357f2fe15197b9890a2.exe 96 PID 4780 wrote to memory of 3620 4780 e205e8cf80a03357f2fe15197b9890a2.exe 96 PID 4780 wrote to memory of 3620 4780 e205e8cf80a03357f2fe15197b9890a2.exe 96 PID 3620 wrote to memory of 1500 3620 e205e8cf80a03357f2fe15197b9890a2.exe 98 PID 3620 wrote to memory of 1500 3620 e205e8cf80a03357f2fe15197b9890a2.exe 98 PID 3620 wrote to memory of 1500 3620 e205e8cf80a03357f2fe15197b9890a2.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exe"C:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exeC:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\e205e8cf80a03357f2fe15197b9890a2.exe" /TN Google_Trk_Updater /F3⤵
- Creates scheduled task(s)
PID:1500
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3988 --field-trial-handle=3536,i,10914981530159316853,12381340356750224673,262144 --variations-seed-version /prefetch:81⤵PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1000KB
MD5ff5e53998b243d46232f928647803f99
SHA1f5999dc13bdb146bec6aebfa25cac7dea2c4ae57
SHA25669fcc706443d7a7fd865ce90d0014f02e070acb5d21950b7fcce0b71297cb7df
SHA5120733d290d6e9e00ae4d34f00d1d3f296a2c429bb25049d0040f31d172120a120f693a3490abae1a2320d93ee225bbbf6070540fe052d0900fcb30eb39ade7f3f