Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2024, 02:18

General

  • Target

    66a2d9a797a53dfee20c2ed6819d0627.exe

  • Size

    5.8MB

  • MD5

    66a2d9a797a53dfee20c2ed6819d0627

  • SHA1

    9a445dced06aa1702f2971179990b3ddbfa4f681

  • SHA256

    16fac30777000a16e64573623673640b70003119b3a7e65420e1208e08f30040

  • SHA512

    ca69d30098d567eb7b40247f2688a617fc84e019da6294b245fdfca2e1c3ec0d9229cb6466f10e0239615fefd1c685cc0fbc170f9fc0ef4110ffa51195106235

  • SSDEEP

    49152:vzlnEcO3Cgrb/TbvO90d7HjmAFd4A64nsfJa/pJMBMvDF/4q4auspdkgKKhdvZfj:63CE/Xx4LKhdkZESp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\66a2d9a797a53dfee20c2ed6819d0627.exe
    "C:\Users\Admin\AppData\Local\Temp\66a2d9a797a53dfee20c2ed6819d0627.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\eGIMc /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:4520
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        PID:3176

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

          Filesize

          5.8MB

          MD5

          07401a393124e00e35d3014b854eaa8e

          SHA1

          30606ced9ee070dbade8f2b91ca21d0fb7da45c2

          SHA256

          a944a1f12474a7fb2dba70bc25d747c6c04a466208be8934dd91307dd4f9d204

          SHA512

          b9713595ebfb8dbf8ad7c3cb1590f6776d72fbb2b94e4eb1735f7d9bc0f6c818a8a02b9298833550445265085389ebe7901eb0a39635c2333eb989fde25ab772

        • C:\Users\Admin\AppData\Local\Temp\eGIMc

          Filesize

          1KB

          MD5

          1bf5076d24d2bd9b2cea3d950f844a7a

          SHA1

          dbb1be5ccc66b7ef0792d35a95a93a1a17b1e636

          SHA256

          d79f2b872feb31a25f8c922621ef3f1342f800a54cd89acb62b9c72e2b2f1da1

          SHA512

          7a1ac5dc0eb4262c9a576cc72e311705c1f90771e4814faae033bf7001837cfd5e11387de548d6a1d6b63801153d5836c10a9d2e4eb0c9b382aa5d3aecc1209c