Analysis

  • max time kernel
    109s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-08-2022 09:14

General

  • Target

    91791f8c459f32dc9bf6ec9f7ee157e322b252bc74b1142705dcc74fe8eced7e.exe

  • Size

    62KB

  • MD5

    e538190af9ed2ee602d3cbbe25fd1d78

  • SHA1

    9649f68d1de493b0f17d93b33c2e6bd0ff149e1e

  • SHA256

    91791f8c459f32dc9bf6ec9f7ee157e322b252bc74b1142705dcc74fe8eced7e

  • SHA512

    99b29ef2c068da8d0d50927463257ae1e90b30dab4114af3c5300084b2a6bbdc1d8b67bc9e3cd6d8bd3320c56bb255f7de3a9f60363f2bc0935603e8929eb99b

Score
10/10

Malware Config

Extracted

Family

netdooka

C2

http://93.115.21.45/gtaddress

Signatures

  • NetDooka

    NetDooka is a malware framework distributed by way of a pay-per-install and written in C#.

  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 12 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91791f8c459f32dc9bf6ec9f7ee157e322b252bc74b1142705dcc74fe8eced7e.exe
    "C:\Users\Admin\AppData\Local\Temp\91791f8c459f32dc9bf6ec9f7ee157e322b252bc74b1142705dcc74fe8eced7e.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SYSTEM32\ping.exe
      "ping.exe" 5.4.3.1
      2⤵
      • Runs ping.exe
      PID:3540
    • C:\Users\Admin\AppData\Local\Temp\interlock_storage_8_57.exe
      "C:\Users\Admin\AppData\Local\Temp\\interlock_storage_8_57.exe"
      2⤵
      • Executes dropped EXE
      PID:228
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 824
        3⤵
        • Program crash
        PID:3232
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 228 -ip 228
    1⤵
      PID:2144

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\interlock_storage_8_57.exe

      Filesize

      54KB

      MD5

      7d6fff4ae0c7ffd8d68486d2df914087

      SHA1

      dc65e3e4c4fb12691fa70f964081600adb18a2ae

      SHA256

      07aec94afba94eb3b35ba5b2e74b37553c3c0fed4f6de1fbac61c20dae3f29d4

      SHA512

      a71ae0c58978c655141670d65649baab3c9e964936e7a9faa4a31ec95f838e691741dc9d230496de494d3ccd5b39b09482f6b317bff8d00c59ef61c322b6b8c4

    • C:\Users\Admin\AppData\Local\Temp\interlock_storage_8_57.exe

      Filesize

      54KB

      MD5

      7d6fff4ae0c7ffd8d68486d2df914087

      SHA1

      dc65e3e4c4fb12691fa70f964081600adb18a2ae

      SHA256

      07aec94afba94eb3b35ba5b2e74b37553c3c0fed4f6de1fbac61c20dae3f29d4

      SHA512

      a71ae0c58978c655141670d65649baab3c9e964936e7a9faa4a31ec95f838e691741dc9d230496de494d3ccd5b39b09482f6b317bff8d00c59ef61c322b6b8c4

    • memory/228-137-0x0000000000420000-0x0000000000430000-memory.dmp

      Filesize

      64KB

    • memory/228-138-0x0000000004CF0000-0x0000000004D12000-memory.dmp

      Filesize

      136KB

    • memory/2640-132-0x00007FFCC1F20000-0x00007FFCC2956000-memory.dmp

      Filesize

      10.2MB