Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 13:16

General

  • Target

    531F6CB76127EAD379D0315A7EF1A3FC61D8FFF1582AA6E4F77CC73259B3E1F2.exe

  • Size

    44KB

  • MD5

    6760dd5d71565ac0cd4cbafcfcea5ff1

  • SHA1

    384d6268d8c62bb1273493dc5a57185680b55739

  • SHA256

    531f6cb76127ead379d0315a7ef1a3fc61d8fff1582aa6e4f77cc73259b3e1f2

  • SHA512

    4779383cb099bc1ae96461b6b07001dc3efd198695f15eaa87705c1c6c94baf89b00b29f892164d2db77d3185c11ef4378a09aca36b4c4f504e6b82f3a017c8f

  • SSDEEP

    768:ySuMLCCb8qs0z3NbVR1ZWTO1Wi+Ys46Aj4z9N9G8Iug3r0PggzQp7j5ALyspH:sMlbXzdz2TahTs4a9Nw8acgGKj5NsJ

Malware Config

Extracted

Family

netdooka

C2

http://93.115.21.45/gtaddress

Signatures

  • NetDooka

    NetDooka is a malware framework distributed by way of a pay-per-install and written in C#.

  • Netdooka family
  • Executes dropped EXE 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\531F6CB76127EAD379D0315A7EF1A3FC61D8FFF1582AA6E4F77CC73259B3E1F2.exe
    "C:\Users\Admin\AppData\Local\Temp\531F6CB76127EAD379D0315A7EF1A3FC61D8FFF1582AA6E4F77CC73259B3E1F2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SYSTEM32\ping.exe
      "ping.exe" 5.4.3.1
      2⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Runs ping.exe
      PID:224
    • C:\Users\Admin\AppData\Local\Temp\interlock_storage_8_57.exe
      "C:\Users\Admin\AppData\Local\Temp\\interlock_storage_8_57.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1464
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 824
        3⤵
        • Program crash
        PID:3476
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1464 -ip 1464
    1⤵
      PID:4776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\interlock_storage_8_57.exe

      Filesize

      36KB

      MD5

      4f6d5d0ba1aa54880f1bcce5ed4858a4

      SHA1

      06d7f2150ebe20a6c3a0e65a46459b5fe2e9ceb2

      SHA256

      1cc21e3bbfc910ff2ceb8e63641582bdcca3e479029aa425c55aa346830c6c72

      SHA512

      fa78f6a16ded41d10bf5a09bfc849452b21e9f0b9d9fe29e9162811aae5912264bf117f30cf2dfd443fa073b925e999ba484ecb6f38b7d8a0f05d839ee40792f

    • memory/1464-11-0x00000000748CE000-0x00000000748CF000-memory.dmp

      Filesize

      4KB

    • memory/1464-12-0x0000000000D30000-0x0000000000D40000-memory.dmp

      Filesize

      64KB

    • memory/1464-13-0x0000000003070000-0x0000000003092000-memory.dmp

      Filesize

      136KB

    • memory/1476-0-0x00007FF847475000-0x00007FF847476000-memory.dmp

      Filesize

      4KB

    • memory/1476-1-0x00007FF8471C0000-0x00007FF847B61000-memory.dmp

      Filesize

      9.6MB

    • memory/1476-2-0x00007FF8471C0000-0x00007FF847B61000-memory.dmp

      Filesize

      9.6MB

    • memory/1476-3-0x00007FF847475000-0x00007FF847476000-memory.dmp

      Filesize

      4KB

    • memory/1476-4-0x00007FF8471C0000-0x00007FF847B61000-memory.dmp

      Filesize

      9.6MB

    • memory/1476-9-0x00007FF8471C0000-0x00007FF847B61000-memory.dmp

      Filesize

      9.6MB