Analysis
-
max time kernel
14s -
max time network
103s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-03-2021 19:42
Static task
static1
Behavioral task
behavioral1
Sample
059d96b63981600043166193b25f479e.exe
Resource
win7v20201028
General
-
Target
059d96b63981600043166193b25f479e.exe
-
Size
241KB
-
MD5
059d96b63981600043166193b25f479e
-
SHA1
7bc871be5b1905692eb1a6d93158668092cdb51c
-
SHA256
f77b3b293e8f2218082419742b85c2156fe8c13353cec54ba021e26312d3698f
-
SHA512
9c10be0296905681b1c52f126ee86a78fe6004f1ffc895e08b403d0726f464546fd308ee57383be23f06fd09e1f099bca3e8b7916715642bdebc2019abb1d2ed
Malware Config
Signatures
-
NetWire RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3972-4-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Loads dropped DLL 1 IoCs
Processes:
059d96b63981600043166193b25f479e.exepid process 648 059d96b63981600043166193b25f479e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
059d96b63981600043166193b25f479e.exedescription pid process target process PID 648 set thread context of 3972 648 059d96b63981600043166193b25f479e.exe 059d96b63981600043166193b25f479e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
059d96b63981600043166193b25f479e.exepid process 648 059d96b63981600043166193b25f479e.exe 648 059d96b63981600043166193b25f479e.exe 648 059d96b63981600043166193b25f479e.exe 648 059d96b63981600043166193b25f479e.exe 648 059d96b63981600043166193b25f479e.exe 648 059d96b63981600043166193b25f479e.exe 648 059d96b63981600043166193b25f479e.exe 648 059d96b63981600043166193b25f479e.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
059d96b63981600043166193b25f479e.exepid process 648 059d96b63981600043166193b25f479e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
059d96b63981600043166193b25f479e.exedescription pid process target process PID 648 wrote to memory of 3972 648 059d96b63981600043166193b25f479e.exe 059d96b63981600043166193b25f479e.exe PID 648 wrote to memory of 3972 648 059d96b63981600043166193b25f479e.exe 059d96b63981600043166193b25f479e.exe PID 648 wrote to memory of 3972 648 059d96b63981600043166193b25f479e.exe 059d96b63981600043166193b25f479e.exe PID 648 wrote to memory of 3972 648 059d96b63981600043166193b25f479e.exe 059d96b63981600043166193b25f479e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\059d96b63981600043166193b25f479e.exe"C:\Users\Admin\AppData\Local\Temp\059d96b63981600043166193b25f479e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\059d96b63981600043166193b25f479e.exe"C:\Users\Admin\AppData\Local\Temp\059d96b63981600043166193b25f479e.exe"2⤵PID:3972
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
dc75a8b470f13c8ee2509f84e5e05eb9
SHA127fe57d610f4c9ff84377911cff2c7db0aa7e0ee
SHA256e416459e6f3011911ecbb3b3eba891b0f82668bef98ea6cbe05ef56dc645027d
SHA51222fbfc9614c5bfbc1e6c5370144d26a540f726edb9b7d7c615f91f179f88f8eb1dff72daff51d594274a326f88404e150a91b3c95aa0b192d6d4a4d28bd11629