Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 06:23

General

  • Target

    10f77d76b1a318b8d39e0c1e5c67e057.exe

  • Size

    166KB

  • MD5

    10f77d76b1a318b8d39e0c1e5c67e057

  • SHA1

    db26a57dde6d6d424fa2e42ad75abbcb8c4c3be0

  • SHA256

    26566a878d027e30e51a4b36d378daefce0b7001e596cbccc438400049646f02

  • SHA512

    6c7fd7d1d0d5d6b0977a921447d87f6e2b745ab87895fb94afc62fe218e05e133c0d499023e73a5b1135e5178223b18ecc33baad90fc4650c6e8b1b49ca73978

  • SSDEEP

    3072:lzG5D1BkzIabO2+jL8JELCB/Nf5fSip3khTdmn:lzG5JBK+jA/Nf56i9qd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10f77d76b1a318b8d39e0c1e5c67e057.exe
    "C:\Users\Admin\AppData\Local\Temp\10f77d76b1a318b8d39e0c1e5c67e057.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3196
    • C:\Windows\Npuhea.exe
      C:\Windows\Npuhea.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:3156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Npuhea.exe

    Filesize

    166KB

    MD5

    10f77d76b1a318b8d39e0c1e5c67e057

    SHA1

    db26a57dde6d6d424fa2e42ad75abbcb8c4c3be0

    SHA256

    26566a878d027e30e51a4b36d378daefce0b7001e596cbccc438400049646f02

    SHA512

    6c7fd7d1d0d5d6b0977a921447d87f6e2b745ab87895fb94afc62fe218e05e133c0d499023e73a5b1135e5178223b18ecc33baad90fc4650c6e8b1b49ca73978

  • C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job

    Filesize

    362B

    MD5

    511b8c5d03df15ef5315fc9dfe7ba295

    SHA1

    f6b59f80c46ebf301c38d6dec607d48dedd7f881

    SHA256

    bf63738016a32618087d7bdcf43daff089e734833b8f66a896d4e5d26bfb52d3

    SHA512

    883382835a490f04f688368274c5847de61aeee4ab168377df6ceb9a9aac2568e6bba21afce38b8e8fe96be211885e486f979cdffe724a80cd8d4739a9fa6529

  • memory/3156-92175-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-25612-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-133238-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-133237-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-7961-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-8-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-19846-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-118165-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-31835-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-43826-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-56293-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-69814-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-79717-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-131953-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3156-105293-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3196-13850-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3196-0-0x00000000004E0000-0x00000000004F3000-memory.dmp

    Filesize

    76KB

  • memory/3196-2430-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/3196-1-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB