Analysis
-
max time kernel
142s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 01:37
Static task
static1
Behavioral task
behavioral1
Sample
9a6fe98528ea9a5cc6ee452823c8e44d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a6fe98528ea9a5cc6ee452823c8e44d.exe
Resource
win10v2004-20231215-en
General
-
Target
9a6fe98528ea9a5cc6ee452823c8e44d.exe
-
Size
59KB
-
MD5
9a6fe98528ea9a5cc6ee452823c8e44d
-
SHA1
cc2a5fecbb313bf6e38fa4878834de1124f7dfc0
-
SHA256
4872c00d72c2785cedbf170172a489ab6aadf6e78bac985fdfba259ed6ce20f6
-
SHA512
39cc495fed54d8bd2130c6071adb4f3b81a199699dd6d0b5c755f1042049b90e29f6d006bfab99b53bc33afd852c94477a3e27300e2fdddd37cd539da7ec89fd
-
SSDEEP
1536:svU70UUfsjwIXu3/4ZmkBps+LXP6B+Jnouy83O:VzUEjwb3AZ++LXSB+Zout3O
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1084 netprotocol.exe 1844 netprotocol.exe -
resource yara_rule behavioral2/memory/3412-3-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/3412-5-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/3412-7-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/3412-21-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/1844-22-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" 9a6fe98528ea9a5cc6ee452823c8e44d.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3980 set thread context of 3412 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 86 PID 1084 set thread context of 1844 1084 netprotocol.exe 88 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 1084 netprotocol.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3980 wrote to memory of 3412 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 86 PID 3980 wrote to memory of 3412 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 86 PID 3980 wrote to memory of 3412 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 86 PID 3980 wrote to memory of 3412 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 86 PID 3980 wrote to memory of 3412 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 86 PID 3980 wrote to memory of 3412 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 86 PID 3980 wrote to memory of 3412 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 86 PID 3980 wrote to memory of 3412 3980 9a6fe98528ea9a5cc6ee452823c8e44d.exe 86 PID 3412 wrote to memory of 1084 3412 9a6fe98528ea9a5cc6ee452823c8e44d.exe 87 PID 3412 wrote to memory of 1084 3412 9a6fe98528ea9a5cc6ee452823c8e44d.exe 87 PID 3412 wrote to memory of 1084 3412 9a6fe98528ea9a5cc6ee452823c8e44d.exe 87 PID 1084 wrote to memory of 1844 1084 netprotocol.exe 88 PID 1084 wrote to memory of 1844 1084 netprotocol.exe 88 PID 1084 wrote to memory of 1844 1084 netprotocol.exe 88 PID 1084 wrote to memory of 1844 1084 netprotocol.exe 88 PID 1084 wrote to memory of 1844 1084 netprotocol.exe 88 PID 1084 wrote to memory of 1844 1084 netprotocol.exe 88 PID 1084 wrote to memory of 1844 1084 netprotocol.exe 88 PID 1084 wrote to memory of 1844 1084 netprotocol.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a6fe98528ea9a5cc6ee452823c8e44d.exe"C:\Users\Admin\AppData\Local\Temp\9a6fe98528ea9a5cc6ee452823c8e44d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\9a6fe98528ea9a5cc6ee452823c8e44d.exe"C:\Users\Admin\AppData\Local\Temp\9a6fe98528ea9a5cc6ee452823c8e44d.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Roaming\netprotocol.exe"C:\Users\Admin\AppData\Roaming\netprotocol.exe"4⤵
- Executes dropped EXE
PID:1844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD53642f728c2765fb9191cecdce355b49f
SHA17aab7db0d136b08c6cab00a6da12fe88821abca5
SHA256df011e49c98ff4a157f943a2ded3a8ccf21d446e7adccd0d85fa27a0028485e1
SHA512ec48595aeaaf09d5658608d8770ef6827bbcba5d1d2f40cf5f3e543bfdeeeb627e2c18fd4d3ee50acfcbf1ecc4bf02b713d9c9b544117eb2143c91b1f88dddac