Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 09:55
Static task
static1
Behavioral task
behavioral1
Sample
3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe
Resource
win10v2004-20220901-en
General
-
Target
3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe
-
Size
164KB
-
MD5
7169b6def6aab90e8b2d004e2b475d19
-
SHA1
3e5513a82d291f08777562dea9c4a09dc1a1e92e
-
SHA256
3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146
-
SHA512
7927f122d1edf3d28c5885f483600169013bfca2d733af8c2c99eb83f7516c56b5fb4b7b7b9e0de13505992cb87d022024d5ddc49894570bee28e224f00d2207
-
SSDEEP
3072:axijh94MFgHon5RY1Nj7PPL/H1P10eMds9VwuVhe5NUE/DdNa9ax3Cjcg2BeXGyn:axijh94PIn5eT56eMds9VwuKnsGyQ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1644 netprotocol.exe 4380 netprotocol.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5068 set thread context of 4356 5068 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 84 PID 1644 set thread context of 4380 1644 netprotocol.exe 86 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 5068 wrote to memory of 4356 5068 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 84 PID 5068 wrote to memory of 4356 5068 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 84 PID 5068 wrote to memory of 4356 5068 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 84 PID 5068 wrote to memory of 4356 5068 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 84 PID 5068 wrote to memory of 4356 5068 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 84 PID 5068 wrote to memory of 4356 5068 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 84 PID 5068 wrote to memory of 4356 5068 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 84 PID 5068 wrote to memory of 4356 5068 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 84 PID 4356 wrote to memory of 1644 4356 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 85 PID 4356 wrote to memory of 1644 4356 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 85 PID 4356 wrote to memory of 1644 4356 3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe 85 PID 1644 wrote to memory of 4380 1644 netprotocol.exe 86 PID 1644 wrote to memory of 4380 1644 netprotocol.exe 86 PID 1644 wrote to memory of 4380 1644 netprotocol.exe 86 PID 1644 wrote to memory of 4380 1644 netprotocol.exe 86 PID 1644 wrote to memory of 4380 1644 netprotocol.exe 86 PID 1644 wrote to memory of 4380 1644 netprotocol.exe 86 PID 1644 wrote to memory of 4380 1644 netprotocol.exe 86 PID 1644 wrote to memory of 4380 1644 netprotocol.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe"C:\Users\Admin\AppData\Local\Temp\3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe3f4fc8ec84eabfaf140b7812b4a5dcf164d0f02de376d22141be14d2cb0b3146.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Roaming\netprotocol.exenetprotocol.exe4⤵
- Executes dropped EXE
PID:4380
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5229e2d8c6d7c687c2671ea4b395f9dc2
SHA15cabcbee28741884e7ce92b99c00bf00638d55e3
SHA256e909cd0efe1123204ecfa7ce8b22101c02ecdc606eca891f3cb3943294b700c7
SHA5120abb2f635a001698970656697b34254ee4a0fa9675ecd7d3ef42388388c9d871817f1e01e4db09b01230e0c0d46ce0e3a357783147891dec131675bba22d776b
-
Filesize
164KB
MD5229e2d8c6d7c687c2671ea4b395f9dc2
SHA15cabcbee28741884e7ce92b99c00bf00638d55e3
SHA256e909cd0efe1123204ecfa7ce8b22101c02ecdc606eca891f3cb3943294b700c7
SHA5120abb2f635a001698970656697b34254ee4a0fa9675ecd7d3ef42388388c9d871817f1e01e4db09b01230e0c0d46ce0e3a357783147891dec131675bba22d776b
-
Filesize
164KB
MD5229e2d8c6d7c687c2671ea4b395f9dc2
SHA15cabcbee28741884e7ce92b99c00bf00638d55e3
SHA256e909cd0efe1123204ecfa7ce8b22101c02ecdc606eca891f3cb3943294b700c7
SHA5120abb2f635a001698970656697b34254ee4a0fa9675ecd7d3ef42388388c9d871817f1e01e4db09b01230e0c0d46ce0e3a357783147891dec131675bba22d776b