Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 17:06
Static task
static1
Behavioral task
behavioral1
Sample
d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe
Resource
win10v2004-20220812-en
General
-
Target
d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe
-
Size
283KB
-
MD5
da5eb5cfd23b40d0a86fe513de090614
-
SHA1
1933a1f549f1e0471167a9b155891d834f902850
-
SHA256
d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4
-
SHA512
7c4ff5aa23340eea2639b9d0177bd54fe2fa7b467a6904c09bb3e0f735785ce666226416b0b23a01d439f3fa65c4dd18f3fea3f8f2ed35f3aae8d3788934faad
-
SSDEEP
3072:OZBUhiVExGM994OV4tkkJG7IZ+P5iW0syG3iDpeWNW:AXkfsbECW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4552 fitnets.exe.exe 2948 fitnets.exe.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Java Update = "fitnets.exe.exe" d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4500 set thread context of 4936 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 81 PID 4552 set thread context of 2948 4552 fitnets.exe.exe 83 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\fitnets.exe.exe d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe File opened for modification C:\Windows\fitnets.exe.exe d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe File opened for modification C:\Windows\fitnets.exe.exe fitnets.exe.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 4552 fitnets.exe.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4936 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 81 PID 4500 wrote to memory of 4936 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 81 PID 4500 wrote to memory of 4936 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 81 PID 4500 wrote to memory of 4936 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 81 PID 4500 wrote to memory of 4936 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 81 PID 4500 wrote to memory of 4936 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 81 PID 4500 wrote to memory of 4936 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 81 PID 4500 wrote to memory of 4936 4500 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 81 PID 4936 wrote to memory of 4552 4936 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 82 PID 4936 wrote to memory of 4552 4936 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 82 PID 4936 wrote to memory of 4552 4936 d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe 82 PID 4552 wrote to memory of 2948 4552 fitnets.exe.exe 83 PID 4552 wrote to memory of 2948 4552 fitnets.exe.exe 83 PID 4552 wrote to memory of 2948 4552 fitnets.exe.exe 83 PID 4552 wrote to memory of 2948 4552 fitnets.exe.exe 83 PID 4552 wrote to memory of 2948 4552 fitnets.exe.exe 83 PID 4552 wrote to memory of 2948 4552 fitnets.exe.exe 83 PID 4552 wrote to memory of 2948 4552 fitnets.exe.exe 83 PID 4552 wrote to memory of 2948 4552 fitnets.exe.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe"C:\Users\Admin\AppData\Local\Temp\d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exeC:\Users\Admin\AppData\Local\Temp\d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\fitnets.exe.exe"C:\Windows\fitnets.exe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\fitnets.exe.exeC:\Windows\fitnets.exe.exe4⤵
- Executes dropped EXE
PID:2948
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5da5eb5cfd23b40d0a86fe513de090614
SHA11933a1f549f1e0471167a9b155891d834f902850
SHA256d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4
SHA5127c4ff5aa23340eea2639b9d0177bd54fe2fa7b467a6904c09bb3e0f735785ce666226416b0b23a01d439f3fa65c4dd18f3fea3f8f2ed35f3aae8d3788934faad
-
Filesize
283KB
MD5da5eb5cfd23b40d0a86fe513de090614
SHA11933a1f549f1e0471167a9b155891d834f902850
SHA256d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4
SHA5127c4ff5aa23340eea2639b9d0177bd54fe2fa7b467a6904c09bb3e0f735785ce666226416b0b23a01d439f3fa65c4dd18f3fea3f8f2ed35f3aae8d3788934faad
-
Filesize
283KB
MD5da5eb5cfd23b40d0a86fe513de090614
SHA11933a1f549f1e0471167a9b155891d834f902850
SHA256d68eb882eccbec5ae081191e7a830fbb105b3e72c2866a1ac6a39de142e815e4
SHA5127c4ff5aa23340eea2639b9d0177bd54fe2fa7b467a6904c09bb3e0f735785ce666226416b0b23a01d439f3fa65c4dd18f3fea3f8f2ed35f3aae8d3788934faad