Order.exe

General
Target

Order.exe

Filesize

853KB

Completed

21-07-2021 06:06

Score
10 /10
MD5

103362e59d9fd456e9ce47da23e14e4f

SHA1

5f557d79f1085f1e05da881204d341f2c82b20b9

SHA256

f1079cf4bfcc93d98a75ee56bac5fc02f9e8bbb2bf255f7c3d0b25504c539e40

Malware Config

Extracted

Family netwire
C2

37.120.234.120:19792

Attributes
activex_autorun
false
activex_key
copy_executable
true
delete_original
false
host_id
HostId-%Rand%
install_path
%AppData%\Install\Host.exe
keylogger_dir
%AppData%\Logs\
lock_executable
false
mutex
FvEKqKqS
offline_keylogger
true
password
Password
registry_autorun
false
startup_name
use_mutex
true
Signatures 9

Filter: none

Discovery
Persistence
  • NetWire RAT payload

    Tags

    Reported IOCs

    resourceyara_rule
    behavioral2/memory/1540-126-0x0000000000400000-0x0000000000433000-memory.dmpnetwire
    behavioral2/memory/1540-127-0x000000000040242D-mapping.dmpnetwire
    behavioral2/memory/1540-128-0x0000000000400000-0x0000000000433000-memory.dmpnetwire
    behavioral2/memory/2276-139-0x00000000056F0000-0x0000000005BEE000-memory.dmpnetwire
    behavioral2/memory/3880-145-0x000000000040242D-mapping.dmpnetwire
  • Netwire

    Description

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE
    Host.exeHost.exe

    Reported IOCs

    pidprocess
    2276Host.exe
    3880Host.exe
  • Suspicious use of SetThreadContext
    Order.exeHost.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 992 set thread context of 1540992Order.exeOrder.exe
    PID 2276 set thread context of 38802276Host.exeHost.exe
  • Enumerates physical storage devices

    Description

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

    TTPs

    System Information Discovery
  • Creates scheduled task(s)
    schtasks.exeschtasks.exe

    Description

    Schtasks is often used by malware for persistence or to perform post-infection execution.

    TTPs

    Scheduled Task

    Reported IOCs

    pidprocess
    1380schtasks.exe
    2304schtasks.exe
  • Suspicious behavior: EnumeratesProcesses
    Order.exeHost.exe

    Reported IOCs

    pidprocess
    992Order.exe
    2276Host.exe
  • Suspicious use of AdjustPrivilegeToken
    Order.exeHost.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege992Order.exe
    Token: SeDebugPrivilege2276Host.exe
  • Suspicious use of WriteProcessMemory
    Order.exeOrder.exeHost.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 992 wrote to memory of 1380992Order.exeschtasks.exe
    PID 992 wrote to memory of 1380992Order.exeschtasks.exe
    PID 992 wrote to memory of 1380992Order.exeschtasks.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 992 wrote to memory of 1540992Order.exeOrder.exe
    PID 1540 wrote to memory of 22761540Order.exeHost.exe
    PID 1540 wrote to memory of 22761540Order.exeHost.exe
    PID 1540 wrote to memory of 22761540Order.exeHost.exe
    PID 2276 wrote to memory of 23042276Host.exeschtasks.exe
    PID 2276 wrote to memory of 23042276Host.exeschtasks.exe
    PID 2276 wrote to memory of 23042276Host.exeschtasks.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
    PID 2276 wrote to memory of 38802276Host.exeHost.exe
Processes 6
  • C:\Users\Admin\AppData\Local\Temp\Order.exe
    "C:\Users\Admin\AppData\Local\Temp\Order.exe"
    Suspicious use of SetThreadContext
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:992
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vabtzuyh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp58CF.tmp"
      Creates scheduled task(s)
      PID:1380
    • C:\Users\Admin\AppData\Local\Temp\Order.exe
      "{path}"
      Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
        Executes dropped EXE
        Suspicious use of SetThreadContext
        Suspicious behavior: EnumeratesProcesses
        Suspicious use of AdjustPrivilegeToken
        Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vabtzuyh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1A4A.tmp"
          Creates scheduled task(s)
          PID:2304
        • C:\Users\Admin\AppData\Roaming\Install\Host.exe
          "{path}"
          Executes dropped EXE
          PID:3880
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                    Privilege Escalation
                      Replay Monitor
                      00:00 00:00
                      Downloads
                      • C:\Users\Admin\AppData\Local\Temp\tmp1A4A.tmp

                        MD5

                        d56ec2d86d030b1848c5dc2c46582fe1

                        SHA1

                        4085bbe2596a8f6d93f5f0f724b06661c198d8a6

                        SHA256

                        216b2bf04f71da8d00ebb1e091be5bdcf35f1548f5f58eab432c677654499e0b

                        SHA512

                        5965e994fbe0622e5d7771e9b4b1aa1e19b4184b5047deed1d22b4f415c5f6052fd057012ffa111875f6a1707fbb391db9c98348652c9dac0c9d8916c4f79aba

                      • C:\Users\Admin\AppData\Local\Temp\tmp58CF.tmp

                        MD5

                        d56ec2d86d030b1848c5dc2c46582fe1

                        SHA1

                        4085bbe2596a8f6d93f5f0f724b06661c198d8a6

                        SHA256

                        216b2bf04f71da8d00ebb1e091be5bdcf35f1548f5f58eab432c677654499e0b

                        SHA512

                        5965e994fbe0622e5d7771e9b4b1aa1e19b4184b5047deed1d22b4f415c5f6052fd057012ffa111875f6a1707fbb391db9c98348652c9dac0c9d8916c4f79aba

                      • C:\Users\Admin\AppData\Roaming\Install\Host.exe

                        MD5

                        103362e59d9fd456e9ce47da23e14e4f

                        SHA1

                        5f557d79f1085f1e05da881204d341f2c82b20b9

                        SHA256

                        f1079cf4bfcc93d98a75ee56bac5fc02f9e8bbb2bf255f7c3d0b25504c539e40

                        SHA512

                        b20e271dfebd76f3353374026eb5b9633f75c3fe359d7c2e17af40b8470b91ff059b757148c11f0287e3d833db3523695035c3313230d8e6662456f928eead6e

                      • C:\Users\Admin\AppData\Roaming\Install\Host.exe

                        MD5

                        103362e59d9fd456e9ce47da23e14e4f

                        SHA1

                        5f557d79f1085f1e05da881204d341f2c82b20b9

                        SHA256

                        f1079cf4bfcc93d98a75ee56bac5fc02f9e8bbb2bf255f7c3d0b25504c539e40

                        SHA512

                        b20e271dfebd76f3353374026eb5b9633f75c3fe359d7c2e17af40b8470b91ff059b757148c11f0287e3d833db3523695035c3313230d8e6662456f928eead6e

                      • C:\Users\Admin\AppData\Roaming\Install\Host.exe

                        MD5

                        103362e59d9fd456e9ce47da23e14e4f

                        SHA1

                        5f557d79f1085f1e05da881204d341f2c82b20b9

                        SHA256

                        f1079cf4bfcc93d98a75ee56bac5fc02f9e8bbb2bf255f7c3d0b25504c539e40

                        SHA512

                        b20e271dfebd76f3353374026eb5b9633f75c3fe359d7c2e17af40b8470b91ff059b757148c11f0287e3d833db3523695035c3313230d8e6662456f928eead6e

                      • memory/992-119-0x00000000049A0000-0x00000000049A1000-memory.dmp

                      • memory/992-118-0x0000000004970000-0x0000000004E6E000-memory.dmp

                      • memory/992-122-0x0000000006580000-0x0000000006637000-memory.dmp

                      • memory/992-123-0x000000000A970000-0x000000000A9DB000-memory.dmp

                      • memory/992-117-0x0000000004A10000-0x0000000004A11000-memory.dmp

                      • memory/992-116-0x0000000004E70000-0x0000000004E71000-memory.dmp

                      • memory/992-120-0x0000000004DD0000-0x0000000004DD2000-memory.dmp

                      • memory/992-121-0x0000000007EE0000-0x0000000007EE1000-memory.dmp

                      • memory/992-114-0x0000000000090000-0x0000000000091000-memory.dmp

                      • memory/1380-124-0x0000000000000000-mapping.dmp

                      • memory/1540-128-0x0000000000400000-0x0000000000433000-memory.dmp

                      • memory/1540-127-0x000000000040242D-mapping.dmp

                      • memory/1540-126-0x0000000000400000-0x0000000000433000-memory.dmp

                      • memory/2276-129-0x0000000000000000-mapping.dmp

                      • memory/2276-139-0x00000000056F0000-0x0000000005BEE000-memory.dmp

                      • memory/2304-142-0x0000000000000000-mapping.dmp

                      • memory/3880-145-0x000000000040242D-mapping.dmp