Analysis
-
max time kernel
186s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23-05-2022 23:44
Static task
static1
Behavioral task
behavioral1
Sample
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe
Resource
win10v2004-20220414-en
General
-
Target
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe
-
Size
169KB
-
MD5
685f862334215b121715934b95732bdf
-
SHA1
dd83f5aea31e34b2d4a395741eef45749afc33b6
-
SHA256
b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
-
SHA512
d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\RedTools\\networker.exe\"" networker.exe -
resource yara_rule behavioral2/memory/4344-131-0x0000000000030000-0x000000000003A000-memory.dmp buer behavioral2/memory/4344-132-0x0000000040000000-0x00000000429E0000-memory.dmp buer behavioral2/memory/1524-137-0x0000000040000000-0x00000000429E0000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1524 networker.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: networker.exe File opened (read-only) \??\G: networker.exe File opened (read-only) \??\I: networker.exe File opened (read-only) \??\R: networker.exe File opened (read-only) \??\S: networker.exe File opened (read-only) \??\T: networker.exe File opened (read-only) \??\W: networker.exe File opened (read-only) \??\A: networker.exe File opened (read-only) \??\Z: networker.exe File opened (read-only) \??\M: networker.exe File opened (read-only) \??\P: networker.exe File opened (read-only) \??\V: networker.exe File opened (read-only) \??\Y: networker.exe File opened (read-only) \??\H: networker.exe File opened (read-only) \??\N: networker.exe File opened (read-only) \??\O: networker.exe File opened (read-only) \??\Q: networker.exe File opened (read-only) \??\X: networker.exe File opened (read-only) \??\L: networker.exe File opened (read-only) \??\F: networker.exe File opened (read-only) \??\J: networker.exe File opened (read-only) \??\K: networker.exe File opened (read-only) \??\U: networker.exe File opened (read-only) \??\E: networker.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 848 4344 WerFault.exe 47 3348 1364 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1524 networker.exe 1524 networker.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4344 wrote to memory of 1524 4344 b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe 77 PID 4344 wrote to memory of 1524 4344 b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe 77 PID 4344 wrote to memory of 1524 4344 b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe 77 PID 1524 wrote to memory of 1364 1524 networker.exe 83 PID 1524 wrote to memory of 1364 1524 networker.exe 83 PID 1524 wrote to memory of 1364 1524 networker.exe 83 PID 1524 wrote to memory of 1364 1524 networker.exe 83 PID 1524 wrote to memory of 1364 1524 networker.exe 83 PID 1524 wrote to memory of 1364 1524 networker.exe 83 PID 1524 wrote to memory of 1364 1524 networker.exe 83 PID 1524 wrote to memory of 1364 1524 networker.exe 83 PID 1524 wrote to memory of 1364 1524 networker.exe 83 PID 1524 wrote to memory of 1364 1524 networker.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe"C:\Users\Admin\AppData\Local\Temp\b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\ProgramData\RedTools\networker.exeC:\ProgramData\RedTools\networker.exe "C:\Users\Admin\AppData\Local\Temp\b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\RedTools\networker.exe3⤵PID:1364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 1804⤵
- Program crash
PID:3348
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 4402⤵
- Program crash
PID:848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4344 -ip 43441⤵PID:796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1364 -ip 13641⤵PID:2276
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5685f862334215b121715934b95732bdf
SHA1dd83f5aea31e34b2d4a395741eef45749afc33b6
SHA256b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
SHA512d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e
-
Filesize
169KB
MD5685f862334215b121715934b95732bdf
SHA1dd83f5aea31e34b2d4a395741eef45749afc33b6
SHA256b6fb293632608978b34f2af759b51ff3ecd198eb495de43a0b845dceed513efc
SHA512d56e2aa73d396ba551325dc9ebd29275696104f5a170bfbbdc320ec6c84c66f7efbc3b9178782f582e029c044948de24b6a850521fd866460efafaac4cd09b9e