Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-02-2024 09:12
Static task
static1
Behavioral task
behavioral1
Sample
a17bea930fd914ae3a089c5232206210.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a17bea930fd914ae3a089c5232206210.exe
Resource
win10v2004-20240221-en
General
-
Target
a17bea930fd914ae3a089c5232206210.exe
-
Size
115KB
-
MD5
a17bea930fd914ae3a089c5232206210
-
SHA1
2fd76f01e9ad49dd8dd43d22d76a064b2508559f
-
SHA256
692b9d5f05c805d37fb1aac3da5abf15070e66b4936f1fe4a57cf75cc8f006d0
-
SHA512
bf3d45de379128bb401feb3ae511de3690a7756116ab7d404264dc29b239cd97e8b8f34ec2a23a72c413c88194ed9bc6c4a7546537e7e55e223be24565a0959f
-
SSDEEP
1536:EItjjAIIKrkdFtFq5WY+CijpODGlPSlO9Ap/juF2z64GGPHD25a8GcxJK:HwfFtIkj1Os6juFgvDoWj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2868 netprotocol.exe 2472 netprotocol.exe -
Loads dropped DLL 3 IoCs
pid Process 2684 a17bea930fd914ae3a089c5232206210.exe 2684 a17bea930fd914ae3a089c5232206210.exe 2868 netprotocol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" a17bea930fd914ae3a089c5232206210.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2068 set thread context of 2684 2068 a17bea930fd914ae3a089c5232206210.exe 28 PID 2868 set thread context of 2472 2868 netprotocol.exe 30 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2684 2068 a17bea930fd914ae3a089c5232206210.exe 28 PID 2068 wrote to memory of 2684 2068 a17bea930fd914ae3a089c5232206210.exe 28 PID 2068 wrote to memory of 2684 2068 a17bea930fd914ae3a089c5232206210.exe 28 PID 2068 wrote to memory of 2684 2068 a17bea930fd914ae3a089c5232206210.exe 28 PID 2068 wrote to memory of 2684 2068 a17bea930fd914ae3a089c5232206210.exe 28 PID 2068 wrote to memory of 2684 2068 a17bea930fd914ae3a089c5232206210.exe 28 PID 2684 wrote to memory of 2868 2684 a17bea930fd914ae3a089c5232206210.exe 29 PID 2684 wrote to memory of 2868 2684 a17bea930fd914ae3a089c5232206210.exe 29 PID 2684 wrote to memory of 2868 2684 a17bea930fd914ae3a089c5232206210.exe 29 PID 2684 wrote to memory of 2868 2684 a17bea930fd914ae3a089c5232206210.exe 29 PID 2868 wrote to memory of 2472 2868 netprotocol.exe 30 PID 2868 wrote to memory of 2472 2868 netprotocol.exe 30 PID 2868 wrote to memory of 2472 2868 netprotocol.exe 30 PID 2868 wrote to memory of 2472 2868 netprotocol.exe 30 PID 2868 wrote to memory of 2472 2868 netprotocol.exe 30 PID 2868 wrote to memory of 2472 2868 netprotocol.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe"C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exeC:\Users\Admin\AppData\Local\Temp\a17bea930fd914ae3a089c5232206210.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe4⤵
- Executes dropped EXE
PID:2472
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD52d5ecf558ca163535dd0ce23846e699f
SHA16b4a48ad111d5c9cbe9167f5d975c944d35c3ccc
SHA256a35f7146650cdb0ad7467a47696f4a2d16ec3ee1829318f16fa18edf1d5aee71
SHA512bdcc0f8734ca99491940b5b42b366e150032f9f71f96f337501d7e08433338b8c27b90a5ea991c1f0793747bb173e71b425bb5afbaaa3e6387353c8ec3aaf02f