Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 09:24
Static task
static1
Behavioral task
behavioral1
Sample
P0 200522-5PRD024.exe
Resource
win7-20220414-en
General
-
Target
P0 200522-5PRD024.exe
-
Size
834KB
-
MD5
8968318de8888badcd0dd9b320bb3ee6
-
SHA1
a6dc14ab8ed7cbbc9cc60316dc6f804850fcc82b
-
SHA256
ab50301ca528c2cee1ed6d8ea39ceed66548cc2f8418d6487573c418dbf1a824
-
SHA512
ac6ebb7c7e185b6b9c2c66cc85404f6fca734a4a4e6ab45df84f7185a4792f61964fbdf103131b0047031e65cc192da8539d9ba2fd5077ab675e0b4371a6e458
Malware Config
Extracted
netwire
nowancenorly.ddns.net:6969
-
activex_autorun
false
- activex_key
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
- install_path
- keylogger_dir
-
lock_executable
false
-
mutex
pYeAqduB
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
startup_name
��9C��ο$75�O�h
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2500-145-0x0000000000400000-0x0000000000444000-memory.dmp netwire behavioral2/memory/2500-148-0x0000000000400000-0x0000000000444000-memory.dmp netwire behavioral2/memory/2500-149-0x0000000000400000-0x0000000000444000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
P0 200522-5PRD024.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation P0 200522-5PRD024.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
P0 200522-5PRD024.exedescription pid process target process PID 4024 set thread context of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
P0 200522-5PRD024.exepowershell.exepowershell.exepid process 4024 P0 200522-5PRD024.exe 4024 P0 200522-5PRD024.exe 4024 P0 200522-5PRD024.exe 4008 powershell.exe 3792 powershell.exe 4024 P0 200522-5PRD024.exe 4024 P0 200522-5PRD024.exe 4024 P0 200522-5PRD024.exe 3792 powershell.exe 4008 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
P0 200522-5PRD024.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4024 P0 200522-5PRD024.exe Token: SeDebugPrivilege 4008 powershell.exe Token: SeDebugPrivilege 3792 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
P0 200522-5PRD024.exedescription pid process target process PID 4024 wrote to memory of 4008 4024 P0 200522-5PRD024.exe powershell.exe PID 4024 wrote to memory of 4008 4024 P0 200522-5PRD024.exe powershell.exe PID 4024 wrote to memory of 4008 4024 P0 200522-5PRD024.exe powershell.exe PID 4024 wrote to memory of 3792 4024 P0 200522-5PRD024.exe powershell.exe PID 4024 wrote to memory of 3792 4024 P0 200522-5PRD024.exe powershell.exe PID 4024 wrote to memory of 3792 4024 P0 200522-5PRD024.exe powershell.exe PID 4024 wrote to memory of 3904 4024 P0 200522-5PRD024.exe schtasks.exe PID 4024 wrote to memory of 3904 4024 P0 200522-5PRD024.exe schtasks.exe PID 4024 wrote to memory of 3904 4024 P0 200522-5PRD024.exe schtasks.exe PID 4024 wrote to memory of 3952 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 3952 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 3952 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe PID 4024 wrote to memory of 2500 4024 P0 200522-5PRD024.exe P0 200522-5PRD024.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\P0 200522-5PRD024.exe"C:\Users\Admin\AppData\Local\Temp\P0 200522-5PRD024.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\P0 200522-5PRD024.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TEKkmyaWugmdb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TEKkmyaWugmdb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDFF0.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\P0 200522-5PRD024.exe"C:\Users\Admin\AppData\Local\Temp\P0 200522-5PRD024.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\P0 200522-5PRD024.exe"C:\Users\Admin\AppData\Local\Temp\P0 200522-5PRD024.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Users\Admin\AppData\Local\Temp\tmpDFF0.tmpFilesize
1KB
MD55c59ea41e5827865e8a42968615d615c
SHA16b59ae22d79f6cbff7da8f0047a4c85fcfb9c46b
SHA256616a75c4f67a7ac5774688288a5b13c49757f1002a3727c375001a19c0fd0df6
SHA5121500a3b39fd52c48450d9af39c7dfef6538ca149de4fc6de45dd9a643c4a17bc29464829853112eef369adaf51b016b26afdd4d9d7cce3d3c7eb5e73ce136db3
-
memory/2500-149-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/2500-148-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/2500-145-0x0000000000400000-0x0000000000444000-memory.dmpFilesize
272KB
-
memory/2500-143-0x0000000000000000-mapping.dmp
-
memory/3792-147-0x0000000005460000-0x00000000054C6000-memory.dmpFilesize
408KB
-
memory/3792-156-0x0000000006E20000-0x0000000006E3A000-memory.dmpFilesize
104KB
-
memory/3792-138-0x0000000000000000-mapping.dmp
-
memory/3792-161-0x0000000007150000-0x0000000007158000-memory.dmpFilesize
32KB
-
memory/3792-140-0x0000000004D20000-0x0000000005348000-memory.dmpFilesize
6.2MB
-
memory/3792-160-0x0000000007170000-0x000000000718A000-memory.dmpFilesize
104KB
-
memory/3792-159-0x0000000007060000-0x000000000706E000-memory.dmpFilesize
56KB
-
memory/3792-157-0x0000000006E90000-0x0000000006E9A000-memory.dmpFilesize
40KB
-
memory/3792-153-0x00000000713A0000-0x00000000713EC000-memory.dmpFilesize
304KB
-
memory/3792-144-0x00000000053C0000-0x00000000053E2000-memory.dmpFilesize
136KB
-
memory/3792-151-0x00000000060D0000-0x0000000006102000-memory.dmpFilesize
200KB
-
memory/3792-150-0x0000000005B10000-0x0000000005B2E000-memory.dmpFilesize
120KB
-
memory/3904-139-0x0000000000000000-mapping.dmp
-
memory/3952-142-0x0000000000000000-mapping.dmp
-
memory/4008-155-0x0000000007F00000-0x000000000857A000-memory.dmpFilesize
6.5MB
-
memory/4008-152-0x00000000713A0000-0x00000000713EC000-memory.dmpFilesize
304KB
-
memory/4008-154-0x0000000006B60000-0x0000000006B7E000-memory.dmpFilesize
120KB
-
memory/4008-137-0x0000000004FF0000-0x0000000005026000-memory.dmpFilesize
216KB
-
memory/4008-158-0x0000000007B40000-0x0000000007BD6000-memory.dmpFilesize
600KB
-
memory/4008-136-0x0000000000000000-mapping.dmp
-
memory/4024-134-0x0000000008250000-0x00000000082EC000-memory.dmpFilesize
624KB
-
memory/4024-132-0x0000000007EE0000-0x0000000007F72000-memory.dmpFilesize
584KB
-
memory/4024-135-0x000000000AB20000-0x000000000AB86000-memory.dmpFilesize
408KB
-
memory/4024-130-0x0000000000FB0000-0x0000000001086000-memory.dmpFilesize
856KB
-
memory/4024-133-0x0000000007F80000-0x0000000007F8A000-memory.dmpFilesize
40KB
-
memory/4024-131-0x00000000083A0000-0x0000000008944000-memory.dmpFilesize
5.6MB