Analysis
-
max time kernel
105s -
max time network
103s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
25-06-2021 15:11
Static task
static1
Behavioral task
behavioral1
Sample
Quotation Price - Double R Trading b.v.exe
Resource
win7v20210408
General
-
Target
Quotation Price - Double R Trading b.v.exe
-
Size
462KB
-
MD5
3c920fab166f834f4c0bdd7c68023103
-
SHA1
3118437d4fd826916e53f67319be19f65083696d
-
SHA256
dd10bbb6a4a85ae9ac6cf5ee9657e466ede164d19b3f40eb7c62e9083cec35d3
-
SHA512
0d051a14d5a79afc0ada2ec9a6af1ee7ef967c90f11932e02b44f9ce51c9bf0159fa6a5b322421fe088f2c1faaa97d62c1e755285f99b1764ac6b251e2d16362
Malware Config
Extracted
netwire
sipex2021.ddns.net:8753
-
activex_autorun
false
- activex_key
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
- install_path
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
- mutex
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
- startup_name
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1612-75-0x000000000040242D-mapping.dmp netwire behavioral1/memory/1612-74-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1612-82-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
MSBuild.exepid process 1612 MSBuild.exe -
Loads dropped DLL 1 IoCs
Processes:
Quotation Price - Double R Trading b.v.exepid process 940 Quotation Price - Double R Trading b.v.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Quotation Price - Double R Trading b.v.exedescription pid process target process PID 940 set thread context of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Quotation Price - Double R Trading b.v.exepowershell.exepid process 940 Quotation Price - Double R Trading b.v.exe 324 powershell.exe 324 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Quotation Price - Double R Trading b.v.exepowershell.exedescription pid process Token: SeDebugPrivilege 940 Quotation Price - Double R Trading b.v.exe Token: SeDebugPrivilege 324 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Quotation Price - Double R Trading b.v.exeWScript.exedescription pid process target process PID 940 wrote to memory of 1456 940 Quotation Price - Double R Trading b.v.exe WScript.exe PID 940 wrote to memory of 1456 940 Quotation Price - Double R Trading b.v.exe WScript.exe PID 940 wrote to memory of 1456 940 Quotation Price - Double R Trading b.v.exe WScript.exe PID 940 wrote to memory of 1456 940 Quotation Price - Double R Trading b.v.exe WScript.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 940 wrote to memory of 1612 940 Quotation Price - Double R Trading b.v.exe MSBuild.exe PID 1456 wrote to memory of 324 1456 WScript.exe powershell.exe PID 1456 wrote to memory of 324 1456 WScript.exe powershell.exe PID 1456 wrote to memory of 324 1456 WScript.exe powershell.exe PID 1456 wrote to memory of 324 1456 WScript.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation Price - Double R Trading b.v.exe"C:\Users\Admin\AppData\Local\Temp\Quotation Price - Double R Trading b.v.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Wcrcjbfpuejnisk.vbs"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\chrome\Google\chrome.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeC:\Users\Admin\AppData\Local\Temp\MSBuild.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\MSBuild.exeMD5
9af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3
-
C:\Users\Admin\AppData\Local\Temp\_Wcrcjbfpuejnisk.vbsMD5
dd324fe7f7eb1af18e2f0c011669c28d
SHA1f1c148fe260963d257eaba866de68ffc09b5ef32
SHA256192db1efb34c22fc3e03aab1f7c74bcfb263d57a75b25d90e1ea5e078207bb6f
SHA51257bc4417a7b458833b1a08c9e949102f336725669b970758bc23720257cb33decd95e42b65bcf259997b5c53ab60912433ac91cd9df674bf52a85e9b6cb3ad59
-
\Users\Admin\AppData\Local\Temp\MSBuild.exeMD5
9af17c8393f0970ee5136bd3ffa27001
SHA14b285b72c1a11285a25f31f2597e090da6bbc049
SHA25671d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019
SHA512b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3
-
memory/324-94-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/324-95-0x0000000006150000-0x0000000006151000-memory.dmpFilesize
4KB
-
memory/324-119-0x0000000006310000-0x0000000006311000-memory.dmpFilesize
4KB
-
memory/324-118-0x0000000006300000-0x0000000006301000-memory.dmpFilesize
4KB
-
memory/324-107-0x000000007EF30000-0x000000007EF31000-memory.dmpFilesize
4KB
-
memory/324-103-0x00000000055E0000-0x00000000055E1000-memory.dmpFilesize
4KB
-
memory/324-102-0x0000000006240000-0x0000000006241000-memory.dmpFilesize
4KB
-
memory/324-89-0x0000000005660000-0x0000000005661000-memory.dmpFilesize
4KB
-
memory/324-86-0x00000000052A0000-0x00000000052A1000-memory.dmpFilesize
4KB
-
memory/324-78-0x0000000000000000-mapping.dmp
-
memory/324-80-0x0000000001F00000-0x0000000001F01000-memory.dmpFilesize
4KB
-
memory/324-81-0x00000000048A0000-0x00000000048A1000-memory.dmpFilesize
4KB
-
memory/324-83-0x0000000004860000-0x0000000004861000-memory.dmpFilesize
4KB
-
memory/324-84-0x0000000004862000-0x0000000004863000-memory.dmpFilesize
4KB
-
memory/324-85-0x00000000046B0000-0x00000000046B1000-memory.dmpFilesize
4KB
-
memory/940-62-0x0000000004AB0000-0x0000000004AB1000-memory.dmpFilesize
4KB
-
memory/940-60-0x0000000001030000-0x0000000001031000-memory.dmpFilesize
4KB
-
memory/940-69-0x0000000005DD0000-0x0000000005E23000-memory.dmpFilesize
332KB
-
memory/940-63-0x0000000004AB5000-0x0000000004AC6000-memory.dmpFilesize
68KB
-
memory/940-64-0x00000000007D0000-0x000000000081C000-memory.dmpFilesize
304KB
-
memory/1456-72-0x0000000075051000-0x0000000075053000-memory.dmpFilesize
8KB
-
memory/1456-70-0x0000000000000000-mapping.dmp
-
memory/1612-82-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1612-74-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1612-75-0x000000000040242D-mapping.dmp