Analysis
-
max time kernel
126s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 03:34
Static task
static1
Behavioral task
behavioral1
Sample
560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe
Resource
win10v2004-20220414-en
General
-
Target
560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe
-
Size
169KB
-
MD5
3fdd3f9ed517441aaab8b67eb40211f5
-
SHA1
e67303a8e18c7b45ca1b402d3d895785432fbd35
-
SHA256
560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c
-
SHA512
20f88ecf5b9e8c6ffbaba836ac5b7f5ff260be1ce7d2069c6d30b138d15f7875882e4e23f860ce783a4e2eb8b2d9cbd9fc120c209e15ab874a57e0f1095f15c2
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\RedTools\\networker.exe\"" networker.exe -
resource yara_rule behavioral1/memory/968-56-0x0000000000020000-0x000000000002A000-memory.dmp buer behavioral1/memory/968-57-0x0000000040000000-0x000000004049D000-memory.dmp buer behavioral1/memory/1984-65-0x0000000040000000-0x000000004049D000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1984 networker.exe -
Deletes itself 1 IoCs
pid Process 1984 networker.exe -
Loads dropped DLL 2 IoCs
pid Process 968 560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe 968 560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: networker.exe File opened (read-only) \??\T: networker.exe File opened (read-only) \??\U: networker.exe File opened (read-only) \??\B: networker.exe File opened (read-only) \??\G: networker.exe File opened (read-only) \??\I: networker.exe File opened (read-only) \??\K: networker.exe File opened (read-only) \??\Q: networker.exe File opened (read-only) \??\Z: networker.exe File opened (read-only) \??\O: networker.exe File opened (read-only) \??\P: networker.exe File opened (read-only) \??\V: networker.exe File opened (read-only) \??\W: networker.exe File opened (read-only) \??\A: networker.exe File opened (read-only) \??\H: networker.exe File opened (read-only) \??\L: networker.exe File opened (read-only) \??\S: networker.exe File opened (read-only) \??\Y: networker.exe File opened (read-only) \??\X: networker.exe File opened (read-only) \??\E: networker.exe File opened (read-only) \??\F: networker.exe File opened (read-only) \??\J: networker.exe File opened (read-only) \??\M: networker.exe File opened (read-only) \??\N: networker.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1968 1716 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1984 networker.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 968 wrote to memory of 1984 968 560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe 28 PID 968 wrote to memory of 1984 968 560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe 28 PID 968 wrote to memory of 1984 968 560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe 28 PID 968 wrote to memory of 1984 968 560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe 28 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1984 wrote to memory of 1716 1984 networker.exe 29 PID 1716 wrote to memory of 1968 1716 secinit.exe 30 PID 1716 wrote to memory of 1968 1716 secinit.exe 30 PID 1716 wrote to memory of 1968 1716 secinit.exe 30 PID 1716 wrote to memory of 1968 1716 secinit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe"C:\Users\Admin\AppData\Local\Temp\560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:968 -
C:\ProgramData\RedTools\networker.exeC:\ProgramData\RedTools\networker.exe "C:\Users\Admin\AppData\Local\Temp\560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\RedTools\networker.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1716 -s 1364⤵
- Program crash
PID:1968
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD53fdd3f9ed517441aaab8b67eb40211f5
SHA1e67303a8e18c7b45ca1b402d3d895785432fbd35
SHA256560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c
SHA51220f88ecf5b9e8c6ffbaba836ac5b7f5ff260be1ce7d2069c6d30b138d15f7875882e4e23f860ce783a4e2eb8b2d9cbd9fc120c209e15ab874a57e0f1095f15c2
-
Filesize
169KB
MD53fdd3f9ed517441aaab8b67eb40211f5
SHA1e67303a8e18c7b45ca1b402d3d895785432fbd35
SHA256560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c
SHA51220f88ecf5b9e8c6ffbaba836ac5b7f5ff260be1ce7d2069c6d30b138d15f7875882e4e23f860ce783a4e2eb8b2d9cbd9fc120c209e15ab874a57e0f1095f15c2
-
Filesize
169KB
MD53fdd3f9ed517441aaab8b67eb40211f5
SHA1e67303a8e18c7b45ca1b402d3d895785432fbd35
SHA256560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c
SHA51220f88ecf5b9e8c6ffbaba836ac5b7f5ff260be1ce7d2069c6d30b138d15f7875882e4e23f860ce783a4e2eb8b2d9cbd9fc120c209e15ab874a57e0f1095f15c2
-
Filesize
169KB
MD53fdd3f9ed517441aaab8b67eb40211f5
SHA1e67303a8e18c7b45ca1b402d3d895785432fbd35
SHA256560269fb9344b2ec68e2f78933eb1f0dcee04e688566cbb2213cb0c5fbbf281c
SHA51220f88ecf5b9e8c6ffbaba836ac5b7f5ff260be1ce7d2069c6d30b138d15f7875882e4e23f860ce783a4e2eb8b2d9cbd9fc120c209e15ab874a57e0f1095f15c2