Analysis

  • max time kernel
    134s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 09:55

General

  • Target

    3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe

  • Size

    164KB

  • MD5

    7169b6def6aab90e8b2d004e2b475d19

  • SHA1

    3e5513a82d291f08777562dea9c4a09dc1a1e92e

  • SHA256

    3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146

  • SHA512

    7927f122d1edf3d28c5885f483600169013bfca2d733af8c2c99eb83f7516c56b5fb4b7b7b9e0de13505992cb87d022024d5ddc49894570bee28e224f00d2207

  • SSDEEP

    3072:axijh94MFgHon5RY1Nj7PPL/H1P10eMds9VwuVhe5NUE/DdNa9ax3Cjcg2BeXGyn:axijh94PIn5eT56eMds9VwuKnsGyQ

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe
    "C:\Users\Admin\AppData\Local\Temp\3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Users\Admin\AppData\Local\Temp\3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe
      3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Users\Admin\AppData\Roaming\netprotocol.exe
        C:\Users\Admin\AppData\Roaming\netprotocol.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1644
        • C:\Users\Admin\AppData\Roaming\netprotocol.exe
          netprotocol.exe
          4⤵
          • Executes dropped EXE
          PID:4380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    164KB

    MD5

    229e2d8c6d7c687c2671ea4b395f9dc2

    SHA1

    5cabcbee28741884e7ce92b99c00bf00638d55e3

    SHA256

    e909cd0efe1123204ecfa7ce8b22101c02ecdc606eca891f3cb3943294b700c7

    SHA512

    0abb2f635a001698970656697b34254ee4a0fa9675ecd7d3ef42388388c9d871817f1e01e4db09b01230e0c0d46ce0e3a357783147891dec131675bba22d776b

  • C:\Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    164KB

    MD5

    229e2d8c6d7c687c2671ea4b395f9dc2

    SHA1

    5cabcbee28741884e7ce92b99c00bf00638d55e3

    SHA256

    e909cd0efe1123204ecfa7ce8b22101c02ecdc606eca891f3cb3943294b700c7

    SHA512

    0abb2f635a001698970656697b34254ee4a0fa9675ecd7d3ef42388388c9d871817f1e01e4db09b01230e0c0d46ce0e3a357783147891dec131675bba22d776b

  • C:\Users\Admin\AppData\Roaming\netprotocol.exe

    Filesize

    164KB

    MD5

    229e2d8c6d7c687c2671ea4b395f9dc2

    SHA1

    5cabcbee28741884e7ce92b99c00bf00638d55e3

    SHA256

    e909cd0efe1123204ecfa7ce8b22101c02ecdc606eca891f3cb3943294b700c7

    SHA512

    0abb2f635a001698970656697b34254ee4a0fa9675ecd7d3ef42388388c9d871817f1e01e4db09b01230e0c0d46ce0e3a357783147891dec131675bba22d776b

  • memory/4356-133-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/4356-134-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/4356-135-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/4356-137-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/4380-147-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB