Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 13:39 UTC
Static task
static1
Behavioral task
behavioral1
Sample
4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe
Resource
win7-20231129-en
10 signatures
150 seconds
General
-
Target
4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe
-
Size
660KB
-
MD5
54a315b26c66694821fb2091ef865f7f
-
SHA1
9f79ec5e7845bd33a58124fd3d10637a20630bb5
-
SHA256
4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef
-
SHA512
625e851ddedd83103d1b27c25bdb8428e8aab9321436d48668112dd887f9ede5655b4f5b13d69e656bae522951c50cedd53426de725788ba5697089e81156814
-
SSDEEP
12288:nBxT3SKVIC9HdFEtttJl3Mob+60MCV94D0cIegdu1oeK/lGRgOUqmq9kR6lhKXhh:BxT3ZVB9HdFQPl3M06MCV9k0DegduieE
Malware Config
Extracted
Family
netdooka
C2
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3540 set thread context of 3808 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 88 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3540 wrote to memory of 3808 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 88 PID 3540 wrote to memory of 3808 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 88 PID 3540 wrote to memory of 3808 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 88 PID 3540 wrote to memory of 3808 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 88 PID 3540 wrote to memory of 3808 3540 4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe"C:\Users\Admin\AppData\Local\Temp\4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe"C:\Users\Admin\AppData\Local\Temp\4ceded881995aa09ac269002c4312560ac38576aa82d95dc85d28a1a2b76bbef.exe"2⤵PID:3808
-
Network
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request20.160.190.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request0.204.248.87.in-addr.arpaIN PTRResponse0.204.248.87.in-addr.arpaIN PTRhttps-87-248-204-0lhrllnwnet
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request132.250.30.184.in-addr.arpaIN PTRResponse132.250.30.184.in-addr.arpaIN PTRa184-30-250-132deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request9.228.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request65.139.73.23.in-addr.arpaIN PTRResponse65.139.73.23.in-addr.arpaIN PTRa23-73-139-65deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request240.197.17.2.in-addr.arpaIN PTRResponse240.197.17.2.in-addr.arpaIN PTRa2-17-197-240deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request249.197.17.2.in-addr.arpaIN PTRResponse249.197.17.2.in-addr.arpaIN PTRa2-17-197-249deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
No results found
-
216 B 158 B 3 1
DNS Request
20.160.190.20.in-addr.arpa
DNS Request
20.160.190.20.in-addr.arpa
DNS Request
20.160.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
0.204.248.87.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
132.250.30.184.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
9.228.82.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
65.139.73.23.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
240.197.17.2.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
249.197.17.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa