Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 23:14
Static task
static1
Behavioral task
behavioral1
Sample
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe
Resource
win10v2004-20220414-en
General
-
Target
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe
-
Size
149KB
-
MD5
9128ba0138be09b05ea45364e482d01d
-
SHA1
94b47559d6367e2f02f0002810f4cb9cee339fa1
-
SHA256
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573
-
SHA512
d677b5db63a188978ebd31ca5a839eedc60f6033cc13839b4df9a067afd85cbf652f1e1d9b66dcb2e699edd5b60b179c9462f74f5b389b80d5381c78a3f56db9
Malware Config
Signatures
-
NetWire RAT payload 8 IoCs
Processes:
resource yara_rule behavioral1/memory/1536-63-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1536-65-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1536-66-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1536-69-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1536-72-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1920-90-0x00000000004021DA-mapping.dmp netwire behavioral1/memory/1920-95-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1920-96-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Notepad.exeNotepad.exepid process 1268 Notepad.exe 1920 Notepad.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Notepad.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{IGXB136N-WP56-42I3-3EN8-85A00571YU01} Notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{IGXB136N-WP56-42I3-3EN8-85A00571YU01}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Notepad.exe\"" Notepad.exe -
Loads dropped DLL 5 IoCs
Processes:
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exeNotepad.exepid process 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 1536 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 1268 Notepad.exe 1268 Notepad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Notepad.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Notepad = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Notepad.exe" Notepad.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exeNotepad.exedescription pid process target process PID 1980 set thread context of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1268 set thread context of 1920 1268 Notepad.exe Notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 8 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_1 \Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_2 -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exeNotepad.exedescription pid process target process PID 1980 wrote to memory of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1980 wrote to memory of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1980 wrote to memory of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1980 wrote to memory of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1980 wrote to memory of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1980 wrote to memory of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1980 wrote to memory of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1980 wrote to memory of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1980 wrote to memory of 1536 1980 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1536 wrote to memory of 1268 1536 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe Notepad.exe PID 1536 wrote to memory of 1268 1536 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe Notepad.exe PID 1536 wrote to memory of 1268 1536 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe Notepad.exe PID 1536 wrote to memory of 1268 1536 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe Notepad.exe PID 1268 wrote to memory of 1920 1268 Notepad.exe Notepad.exe PID 1268 wrote to memory of 1920 1268 Notepad.exe Notepad.exe PID 1268 wrote to memory of 1920 1268 Notepad.exe Notepad.exe PID 1268 wrote to memory of 1920 1268 Notepad.exe Notepad.exe PID 1268 wrote to memory of 1920 1268 Notepad.exe Notepad.exe PID 1268 wrote to memory of 1920 1268 Notepad.exe Notepad.exe PID 1268 wrote to memory of 1920 1268 Notepad.exe Notepad.exe PID 1268 wrote to memory of 1920 1268 Notepad.exe Notepad.exe PID 1268 wrote to memory of 1920 1268 Notepad.exe Notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe"C:\Users\Admin\AppData\Local\Temp\3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exeC:\Users\Admin\AppData\Local\Temp\3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeC:\Users\Admin\AppData\Roaming\Install\Notepad.exe4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HauberkPunctilioFilesize
1KB
MD57faf3470e1e405dcf83f35aac7611210
SHA1b53016b654d9c8077da583852eccff50051a62cb
SHA25690f6f3d8343f87281343aef85eafa0548c3b4390d78d1b00ea2e661e96a537cb
SHA51252e3865fc2bce349536c13b9ff891d6037e768080867b016122e31cc5ab1fc8a97983b10ab0690852c170ae1e86ddf5e4d7b47cdca639d53101f802a230571f4
-
C:\Users\Admin\AppData\Local\Temp\tapestries.dllMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\tweakChkDsk_zh-tw.p5pMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeFilesize
149KB
MD59128ba0138be09b05ea45364e482d01d
SHA194b47559d6367e2f02f0002810f4cb9cee339fa1
SHA2563777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573
SHA512d677b5db63a188978ebd31ca5a839eedc60f6033cc13839b4df9a067afd85cbf652f1e1d9b66dcb2e699edd5b60b179c9462f74f5b389b80d5381c78a3f56db9
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeFilesize
149KB
MD59128ba0138be09b05ea45364e482d01d
SHA194b47559d6367e2f02f0002810f4cb9cee339fa1
SHA2563777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573
SHA512d677b5db63a188978ebd31ca5a839eedc60f6033cc13839b4df9a067afd85cbf652f1e1d9b66dcb2e699edd5b60b179c9462f74f5b389b80d5381c78a3f56db9
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeFilesize
149KB
MD59128ba0138be09b05ea45364e482d01d
SHA194b47559d6367e2f02f0002810f4cb9cee339fa1
SHA2563777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573
SHA512d677b5db63a188978ebd31ca5a839eedc60f6033cc13839b4df9a067afd85cbf652f1e1d9b66dcb2e699edd5b60b179c9462f74f5b389b80d5381c78a3f56db9
-
\Users\Admin\AppData\Local\Temp\nsiCE.tmp\System.dllFilesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
\Users\Admin\AppData\Local\Temp\nsj2CAF.tmp\System.dllFilesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
\Users\Admin\AppData\Local\Temp\tapestries.dllFilesize
79KB
MD5de483549656bf835dc68066cf8ec272d
SHA14d85bae725f0fa326985a2e2b978561a8e7761e8
SHA2565ff1e02cdb416efe370170341c6fe22d0044c4e7066a06cd62a698735597f85c
SHA512c42fb330a2a916e5a345cdaa4afddd83c6213a69bad6d6ed76aaa4fa5c4be0e8241ba356275aed9a848c11dae272f681486e22b1e5a0fba70e2a3f59c66fd538
-
\Users\Admin\AppData\Local\Temp\tapestries.dllFilesize
79KB
MD5de483549656bf835dc68066cf8ec272d
SHA14d85bae725f0fa326985a2e2b978561a8e7761e8
SHA2565ff1e02cdb416efe370170341c6fe22d0044c4e7066a06cd62a698735597f85c
SHA512c42fb330a2a916e5a345cdaa4afddd83c6213a69bad6d6ed76aaa4fa5c4be0e8241ba356275aed9a848c11dae272f681486e22b1e5a0fba70e2a3f59c66fd538
-
\Users\Admin\AppData\Roaming\Install\Notepad.exeFilesize
149KB
MD59128ba0138be09b05ea45364e482d01d
SHA194b47559d6367e2f02f0002810f4cb9cee339fa1
SHA2563777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573
SHA512d677b5db63a188978ebd31ca5a839eedc60f6033cc13839b4df9a067afd85cbf652f1e1d9b66dcb2e699edd5b60b179c9462f74f5b389b80d5381c78a3f56db9
-
memory/1268-71-0x0000000000000000-mapping.dmp
-
memory/1536-61-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1536-72-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1536-69-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1536-66-0x00000000004021DA-mapping.dmp
-
memory/1536-65-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1536-63-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1536-59-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1536-58-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1920-90-0x00000000004021DA-mapping.dmp
-
memory/1920-95-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1920-96-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1980-54-0x00000000768D1000-0x00000000768D3000-memory.dmpFilesize
8KB
-
memory/1980-57-0x00000000003B0000-0x00000000003CC000-memory.dmpFilesize
112KB