Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 03:12
Static task
static1
Behavioral task
behavioral1
Sample
35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe
Resource
win10v2004-20220414-en
General
-
Target
35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe
-
Size
168KB
-
MD5
a69ec18cd982181a5fbd2789663a88bf
-
SHA1
7d44fdc6938916a54103169d1de0032ddeab0e35
-
SHA256
35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a
-
SHA512
f61baf6748f3c7a5da5e46693274e8d748699199c187a3dbb550747832fcade594f618ffbc5cbba5aa3848ec716ec8f2fb8267c8d2b15e9f63687ad1211f6900
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\RedTools\\networker.exe\"" networker.exe -
resource yara_rule behavioral2/memory/3092-131-0x0000000000030000-0x000000000003A000-memory.dmp buer behavioral2/memory/3092-132-0x0000000040000000-0x000000004049C000-memory.dmp buer behavioral2/memory/3912-137-0x0000000040000000-0x000000004049C000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 3912 networker.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4456 3092 WerFault.exe 16 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3092 wrote to memory of 3912 3092 35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe 87 PID 3092 wrote to memory of 3912 3092 35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe 87 PID 3092 wrote to memory of 3912 3092 35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe 87 PID 3912 wrote to memory of 2036 3912 networker.exe 91 PID 3912 wrote to memory of 2036 3912 networker.exe 91 PID 3912 wrote to memory of 2036 3912 networker.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe"C:\Users\Admin\AppData\Local\Temp\35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\ProgramData\RedTools\networker.exeC:\ProgramData\RedTools\networker.exe "C:\Users\Admin\AppData\Local\Temp\35ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\RedTools\networker.exe3⤵PID:2036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 4362⤵
- Program crash
PID:4456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3092 -ip 30921⤵PID:3572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a69ec18cd982181a5fbd2789663a88bf
SHA17d44fdc6938916a54103169d1de0032ddeab0e35
SHA25635ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a
SHA512f61baf6748f3c7a5da5e46693274e8d748699199c187a3dbb550747832fcade594f618ffbc5cbba5aa3848ec716ec8f2fb8267c8d2b15e9f63687ad1211f6900
-
Filesize
168KB
MD5a69ec18cd982181a5fbd2789663a88bf
SHA17d44fdc6938916a54103169d1de0032ddeab0e35
SHA25635ed64be314538c7a7a019331fe2c4faff7fd55c93f9a9bc5911cd705a60e90a
SHA512f61baf6748f3c7a5da5e46693274e8d748699199c187a3dbb550747832fcade594f618ffbc5cbba5aa3848ec716ec8f2fb8267c8d2b15e9f63687ad1211f6900