Analysis
-
max time kernel
64s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-05-2022 05:16
Static task
static1
Behavioral task
behavioral1
Sample
PO-9768708-Hyundai-09221-6138 pdf.exe
Resource
win7-20220414-en
General
-
Target
PO-9768708-Hyundai-09221-6138 pdf.exe
-
Size
702KB
-
MD5
5df0240aa06b38e1a88fde9c6c5c306e
-
SHA1
2a3d233fed9ea294b049061fe85e471cabc83f97
-
SHA256
869fa23919d381e4af0d8c04881d65ad842cb96020da5c1e16f65c48190d3eef
-
SHA512
cfff543c68effd0051e6f29be985e6527f317ea5813bc695de4b0a97bda68ca29f6d05c3a9b6efb9bf98596aef403d25373c3bcf58d10f84678b276d52b6d8a0
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1252-68-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1252-70-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1252-71-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1252-74-0x000000000041AE7B-mapping.dmp netwire behavioral1/memory/1252-73-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1252-77-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/1252-79-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO-9768708-Hyundai-09221-6138 pdf.exedescription pid process target process PID 1092 set thread context of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
PO-9768708-Hyundai-09221-6138 pdf.exepowershell.exepid process 1092 PO-9768708-Hyundai-09221-6138 pdf.exe 1092 PO-9768708-Hyundai-09221-6138 pdf.exe 1092 PO-9768708-Hyundai-09221-6138 pdf.exe 1092 PO-9768708-Hyundai-09221-6138 pdf.exe 1092 PO-9768708-Hyundai-09221-6138 pdf.exe 1092 PO-9768708-Hyundai-09221-6138 pdf.exe 1108 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PO-9768708-Hyundai-09221-6138 pdf.exepowershell.exedescription pid process Token: SeDebugPrivilege 1092 PO-9768708-Hyundai-09221-6138 pdf.exe Token: SeDebugPrivilege 1108 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
PO-9768708-Hyundai-09221-6138 pdf.exedescription pid process target process PID 1092 wrote to memory of 1108 1092 PO-9768708-Hyundai-09221-6138 pdf.exe powershell.exe PID 1092 wrote to memory of 1108 1092 PO-9768708-Hyundai-09221-6138 pdf.exe powershell.exe PID 1092 wrote to memory of 1108 1092 PO-9768708-Hyundai-09221-6138 pdf.exe powershell.exe PID 1092 wrote to memory of 1108 1092 PO-9768708-Hyundai-09221-6138 pdf.exe powershell.exe PID 1092 wrote to memory of 2024 1092 PO-9768708-Hyundai-09221-6138 pdf.exe schtasks.exe PID 1092 wrote to memory of 2024 1092 PO-9768708-Hyundai-09221-6138 pdf.exe schtasks.exe PID 1092 wrote to memory of 2024 1092 PO-9768708-Hyundai-09221-6138 pdf.exe schtasks.exe PID 1092 wrote to memory of 2024 1092 PO-9768708-Hyundai-09221-6138 pdf.exe schtasks.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe PID 1092 wrote to memory of 1252 1092 PO-9768708-Hyundai-09221-6138 pdf.exe PO-9768708-Hyundai-09221-6138 pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO-9768708-Hyundai-09221-6138 pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO-9768708-Hyundai-09221-6138 pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KPwtapzko.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KPwtapzko" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCF9F.tmp"2⤵
- Creates scheduled task(s)
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\PO-9768708-Hyundai-09221-6138 pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO-9768708-Hyundai-09221-6138 pdf.exe"2⤵PID:1252
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5319a273b68894a8032e131c72438fd84
SHA13ce9745d2ac9a95283924088df85e7002137aeeb
SHA25603acc711d098ebfe378410e02ae0a7057283814a546536ca30bbf2c2a1cd476c
SHA512a191be432baf59f5d1192b59a76bb0ac5d85172603a39b45575c535dddec3b79d5b6b8099267b8183a0d99ce41bca060398169619a35cf27864eabfaadb158bf