Analysis
-
max time kernel
33s -
max time network
139s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-04-2021 06:48
Static task
static1
Behavioral task
behavioral1
Sample
Absa.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Absa.exe
Resource
win10v20210410
General
-
Target
Absa.exe
-
Size
1.1MB
-
MD5
543b483edf1e71d19b7e2ca64ce9e2d9
-
SHA1
9c91f6bf2f7d23f288119d95999e107308151f8a
-
SHA256
71bb1f2e0a1aecf13985a354d05fb522c85746e08a01a858a4473237a96e85fd
-
SHA512
b0f2111e1a7c6977548b983cfb1abc92b9d2690d04d7c85ef0cde35b869fcac9666163821212088dc90a5afb1c533adf69d7bbc53939caea6996a6187a9006a7
Malware Config
Extracted
netwire
194.5.97.181:3383
194.5.97.181:3385
-
activex_autorun
false
- activex_key
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
- install_path
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
- mutex
-
offline_keylogger
true
-
password
London@1961
-
registry_autorun
false
- startup_name
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/792-70-0x0000000000240000-0x0000000000869000-memory.dmp netwire behavioral1/memory/792-71-0x000000000024242D-mapping.dmp netwire behavioral1/memory/792-73-0x0000000000240000-0x0000000000869000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
wlxuupkxco.pifpid process 516 wlxuupkxco.pif -
Loads dropped DLL 4 IoCs
Processes:
Absa.exepid process 1948 Absa.exe 1948 Absa.exe 1948 Absa.exe 1948 Absa.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wlxuupkxco.pifdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run wlxuupkxco.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\59622800\\WLXUUP~1.PIF C:\\Users\\Admin\\59622800\\KKFFMH~1.HHQ" wlxuupkxco.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wlxuupkxco.pifdescription pid process target process PID 516 set thread context of 792 516 wlxuupkxco.pif RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Absa.exewlxuupkxco.pifdescription pid process target process PID 1948 wrote to memory of 516 1948 Absa.exe wlxuupkxco.pif PID 1948 wrote to memory of 516 1948 Absa.exe wlxuupkxco.pif PID 1948 wrote to memory of 516 1948 Absa.exe wlxuupkxco.pif PID 1948 wrote to memory of 516 1948 Absa.exe wlxuupkxco.pif PID 516 wrote to memory of 792 516 wlxuupkxco.pif RegSvcs.exe PID 516 wrote to memory of 792 516 wlxuupkxco.pif RegSvcs.exe PID 516 wrote to memory of 792 516 wlxuupkxco.pif RegSvcs.exe PID 516 wrote to memory of 792 516 wlxuupkxco.pif RegSvcs.exe PID 516 wrote to memory of 792 516 wlxuupkxco.pif RegSvcs.exe PID 516 wrote to memory of 792 516 wlxuupkxco.pif RegSvcs.exe PID 516 wrote to memory of 792 516 wlxuupkxco.pif RegSvcs.exe PID 516 wrote to memory of 792 516 wlxuupkxco.pif RegSvcs.exe PID 516 wrote to memory of 792 516 wlxuupkxco.pif RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Absa.exe"C:\Users\Admin\AppData\Local\Temp\Absa.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\59622800\wlxuupkxco.pif"C:\Users\Admin\59622800\wlxuupkxco.pif" kkffmheei.hhq2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:792
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4676eded8ee04e1415e80b0fc16c9936
SHA11a1750fb869ef004ee77d52ac32d487556b39e56
SHA2568a9beecd1526fad1f7667c35bc9210fae014581d558338368a0eaab2af3842d7
SHA5123548de4ff048cf4a79895e9399ceac3d7e4874c5d9129bc1900a33423a833a9030aae77bb2234ec64debced3487eeb0eb7a84959ab69cec10460c1a9e9abf6b9
-
MD5
dab594f358a04f4d32b6665900dad494
SHA12afc7733985ba9806a93f874f53826b4b8845ccf
SHA256c9297b1510acf5a497e165884a6b56b5cd22809562f20bb0835e09674cfacd0a
SHA512dd1b2c1d1b31476022ac31e9dc4af812ee73c82fc52a5544f8736c339494517de72a123575a92ac6a8a3483f4166adc697516b1c13ada3236111ae36c5b9f36c
-
MD5
8697c9cc411d42f598243797c53bae95
SHA1efa1efb4b5e463d42d6f496883297b7a47c23796
SHA256be731b853d1752b83706346f2256d4f2d9e39207f066a0c6876044229b784a8d
SHA5127982891c8dd3b41e2466f183377f6533981f7d3807eb40105ca996ad080420250fde54ab0710c8cc1adf7a453cc769683e0dff93b825fb7d486cd8bf739c784a
-
MD5
8697c9cc411d42f598243797c53bae95
SHA1efa1efb4b5e463d42d6f496883297b7a47c23796
SHA256be731b853d1752b83706346f2256d4f2d9e39207f066a0c6876044229b784a8d
SHA5127982891c8dd3b41e2466f183377f6533981f7d3807eb40105ca996ad080420250fde54ab0710c8cc1adf7a453cc769683e0dff93b825fb7d486cd8bf739c784a
-
MD5
8697c9cc411d42f598243797c53bae95
SHA1efa1efb4b5e463d42d6f496883297b7a47c23796
SHA256be731b853d1752b83706346f2256d4f2d9e39207f066a0c6876044229b784a8d
SHA5127982891c8dd3b41e2466f183377f6533981f7d3807eb40105ca996ad080420250fde54ab0710c8cc1adf7a453cc769683e0dff93b825fb7d486cd8bf739c784a
-
MD5
8697c9cc411d42f598243797c53bae95
SHA1efa1efb4b5e463d42d6f496883297b7a47c23796
SHA256be731b853d1752b83706346f2256d4f2d9e39207f066a0c6876044229b784a8d
SHA5127982891c8dd3b41e2466f183377f6533981f7d3807eb40105ca996ad080420250fde54ab0710c8cc1adf7a453cc769683e0dff93b825fb7d486cd8bf739c784a
-
MD5
8697c9cc411d42f598243797c53bae95
SHA1efa1efb4b5e463d42d6f496883297b7a47c23796
SHA256be731b853d1752b83706346f2256d4f2d9e39207f066a0c6876044229b784a8d
SHA5127982891c8dd3b41e2466f183377f6533981f7d3807eb40105ca996ad080420250fde54ab0710c8cc1adf7a453cc769683e0dff93b825fb7d486cd8bf739c784a