Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-05-2022 23:44
Static task
static1
Behavioral task
behavioral1
Sample
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe
Resource
win10v2004-20220414-en
General
-
Target
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe
-
Size
169KB
-
MD5
685f862334215b121715934b95732bdf
-
SHA1
dd83f5aea31e34b2d4a395741eef45749afc33b6
-
SHA256
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
-
SHA512
d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\RedTools\\networker.exe\"" networker.exe -
resource yara_rule behavioral1/memory/1240-57-0x0000000000020000-0x000000000002A000-memory.dmp buer behavioral1/memory/1240-58-0x0000000040000000-0x00000000429E0000-memory.dmp buer behavioral1/memory/1636-67-0x0000000040000000-0x00000000429E0000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1636 networker.exe -
Deletes itself 1 IoCs
pid Process 1636 networker.exe -
Loads dropped DLL 2 IoCs
pid Process 1240 b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe 1240 b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: networker.exe File opened (read-only) \??\L: networker.exe File opened (read-only) \??\Z: networker.exe File opened (read-only) \??\A: networker.exe File opened (read-only) \??\B: networker.exe File opened (read-only) \??\H: networker.exe File opened (read-only) \??\K: networker.exe File opened (read-only) \??\V: networker.exe File opened (read-only) \??\Y: networker.exe File opened (read-only) \??\T: networker.exe File opened (read-only) \??\U: networker.exe File opened (read-only) \??\E: networker.exe File opened (read-only) \??\F: networker.exe File opened (read-only) \??\M: networker.exe File opened (read-only) \??\P: networker.exe File opened (read-only) \??\Q: networker.exe File opened (read-only) \??\S: networker.exe File opened (read-only) \??\W: networker.exe File opened (read-only) \??\G: networker.exe File opened (read-only) \??\I: networker.exe File opened (read-only) \??\N: networker.exe File opened (read-only) \??\O: networker.exe File opened (read-only) \??\R: networker.exe File opened (read-only) \??\X: networker.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1980 592 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1636 networker.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1240 wrote to memory of 1636 1240 b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe 27 PID 1240 wrote to memory of 1636 1240 b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe 27 PID 1240 wrote to memory of 1636 1240 b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe 27 PID 1240 wrote to memory of 1636 1240 b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe 27 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 1636 wrote to memory of 592 1636 networker.exe 28 PID 592 wrote to memory of 1980 592 secinit.exe 29 PID 592 wrote to memory of 1980 592 secinit.exe 29 PID 592 wrote to memory of 1980 592 secinit.exe 29 PID 592 wrote to memory of 1980 592 secinit.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe"C:\Users\Admin\AppData\Local\Temp\b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\ProgramData\RedTools\networker.exeC:\ProgramData\RedTools\networker.exe "C:\Users\Admin\AppData\Local\Temp\b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\RedTools\networker.exe3⤵
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 1364⤵
- Program crash
PID:1980
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5685f862334215b121715934b95732bdf
SHA1dd83f5aea31e34b2d4a395741eef45749afc33b6
SHA256b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
SHA512d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e
-
Filesize
169KB
MD5685f862334215b121715934b95732bdf
SHA1dd83f5aea31e34b2d4a395741eef45749afc33b6
SHA256b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
SHA512d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e
-
Filesize
169KB
MD5685f862334215b121715934b95732bdf
SHA1dd83f5aea31e34b2d4a395741eef45749afc33b6
SHA256b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
SHA512d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e
-
Filesize
169KB
MD5685f862334215b121715934b95732bdf
SHA1dd83f5aea31e34b2d4a395741eef45749afc33b6
SHA256b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
SHA512d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e