Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
10f77d76b1a318b8d39e0c1e5c67e057.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10f77d76b1a318b8d39e0c1e5c67e057.exe
Resource
win10v2004-20231215-en
General
-
Target
10f77d76b1a318b8d39e0c1e5c67e057.exe
-
Size
166KB
-
MD5
10f77d76b1a318b8d39e0c1e5c67e057
-
SHA1
db26a57dde6d6d424fa2e42ad75abbcb8c4c3be0
-
SHA256
26566a878d027e30e51a4b36d378daefce0b7001e596cbccc438400049646f02
-
SHA512
6c7fd7d1d0d5d6b0977a921447d87f6e2b745ab87895fb94afc62fe218e05e133c0d499023e73a5b1135e5178223b18ecc33baad90fc4650c6e8b1b49ca73978
-
SSDEEP
3072:lzG5D1BkzIabO2+jL8JELCB/Nf5fSip3khTdmn:lzG5JBK+jA/Nf56i9qd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3156 Npuhea.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Npuhea.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Npuhea.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 10f77d76b1a318b8d39e0c1e5c67e057.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 10f77d76b1a318b8d39e0c1e5c67e057.exe File created C:\Windows\Npuhea.exe 10f77d76b1a318b8d39e0c1e5c67e057.exe File opened for modification C:\Windows\Npuhea.exe 10f77d76b1a318b8d39e0c1e5c67e057.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Software\Microsoft\Internet Explorer\International Npuhea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe 3156 Npuhea.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3196 10f77d76b1a318b8d39e0c1e5c67e057.exe 3156 Npuhea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3196 wrote to memory of 3156 3196 10f77d76b1a318b8d39e0c1e5c67e057.exe 94 PID 3196 wrote to memory of 3156 3196 10f77d76b1a318b8d39e0c1e5c67e057.exe 94 PID 3196 wrote to memory of 3156 3196 10f77d76b1a318b8d39e0c1e5c67e057.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\10f77d76b1a318b8d39e0c1e5c67e057.exe"C:\Users\Admin\AppData\Local\Temp\10f77d76b1a318b8d39e0c1e5c67e057.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\Npuhea.exeC:\Windows\Npuhea.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD510f77d76b1a318b8d39e0c1e5c67e057
SHA1db26a57dde6d6d424fa2e42ad75abbcb8c4c3be0
SHA25626566a878d027e30e51a4b36d378daefce0b7001e596cbccc438400049646f02
SHA5126c7fd7d1d0d5d6b0977a921447d87f6e2b745ab87895fb94afc62fe218e05e133c0d499023e73a5b1135e5178223b18ecc33baad90fc4650c6e8b1b49ca73978
-
Filesize
362B
MD5511b8c5d03df15ef5315fc9dfe7ba295
SHA1f6b59f80c46ebf301c38d6dec607d48dedd7f881
SHA256bf63738016a32618087d7bdcf43daff089e734833b8f66a896d4e5d26bfb52d3
SHA512883382835a490f04f688368274c5847de61aeee4ab168377df6ceb9a9aac2568e6bba21afce38b8e8fe96be211885e486f979cdffe724a80cd8d4739a9fa6529