Analysis
-
max time kernel
151s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 23:14
Static task
static1
Behavioral task
behavioral1
Sample
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe
Resource
win10v2004-20220414-en
General
-
Target
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe
-
Size
149KB
-
MD5
9128ba0138be09b05ea45364e482d01d
-
SHA1
94b47559d6367e2f02f0002810f4cb9cee339fa1
-
SHA256
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573
-
SHA512
d677b5db63a188978ebd31ca5a839eedc60f6033cc13839b4df9a067afd85cbf652f1e1d9b66dcb2e699edd5b60b179c9462f74f5b389b80d5381c78a3f56db9
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1020-136-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/1020-138-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/1020-141-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/892-155-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Notepad.exeNotepad.exepid process 4616 Notepad.exe 892 Notepad.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Notepad.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{IGXB136N-WP56-42I3-3EN8-85A00571YU01} Notepad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{IGXB136N-WP56-42I3-3EN8-85A00571YU01}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Notepad.exe\"" Notepad.exe -
Loads dropped DLL 6 IoCs
Processes:
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exeNotepad.exepid process 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 4616 Notepad.exe 4616 Notepad.exe 4616 Notepad.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Notepad.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Notepad = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Notepad.exe" Notepad.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exeNotepad.exedescription pid process target process PID 1392 set thread context of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 4616 set thread context of 892 4616 Notepad.exe Notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Install\Notepad.exe nsis_installer_2 -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exeNotepad.exedescription pid process target process PID 1392 wrote to memory of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1392 wrote to memory of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1392 wrote to memory of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1392 wrote to memory of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1392 wrote to memory of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1392 wrote to memory of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1392 wrote to memory of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1392 wrote to memory of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1392 wrote to memory of 1020 1392 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe PID 1020 wrote to memory of 4616 1020 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe Notepad.exe PID 1020 wrote to memory of 4616 1020 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe Notepad.exe PID 1020 wrote to memory of 4616 1020 3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe Notepad.exe PID 4616 wrote to memory of 892 4616 Notepad.exe Notepad.exe PID 4616 wrote to memory of 892 4616 Notepad.exe Notepad.exe PID 4616 wrote to memory of 892 4616 Notepad.exe Notepad.exe PID 4616 wrote to memory of 892 4616 Notepad.exe Notepad.exe PID 4616 wrote to memory of 892 4616 Notepad.exe Notepad.exe PID 4616 wrote to memory of 892 4616 Notepad.exe Notepad.exe PID 4616 wrote to memory of 892 4616 Notepad.exe Notepad.exe PID 4616 wrote to memory of 892 4616 Notepad.exe Notepad.exe PID 4616 wrote to memory of 892 4616 Notepad.exe Notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe"C:\Users\Admin\AppData\Local\Temp\3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exeC:\Users\Admin\AppData\Local\Temp\3777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"C:\Users\Admin\AppData\Roaming\Install\Notepad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeC:\Users\Admin\AppData\Roaming\Install\Notepad.exe4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HauberkPunctilioFilesize
1KB
MD57faf3470e1e405dcf83f35aac7611210
SHA1b53016b654d9c8077da583852eccff50051a62cb
SHA25690f6f3d8343f87281343aef85eafa0548c3b4390d78d1b00ea2e661e96a537cb
SHA51252e3865fc2bce349536c13b9ff891d6037e768080867b016122e31cc5ab1fc8a97983b10ab0690852c170ae1e86ddf5e4d7b47cdca639d53101f802a230571f4
-
C:\Users\Admin\AppData\Local\Temp\nsg7C08.tmp\System.dllFilesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
C:\Users\Admin\AppData\Local\Temp\nsp470D.tmp\System.dllFilesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
C:\Users\Admin\AppData\Local\Temp\tapestries.dllFilesize
79KB
MD5de483549656bf835dc68066cf8ec272d
SHA14d85bae725f0fa326985a2e2b978561a8e7761e8
SHA2565ff1e02cdb416efe370170341c6fe22d0044c4e7066a06cd62a698735597f85c
SHA512c42fb330a2a916e5a345cdaa4afddd83c6213a69bad6d6ed76aaa4fa5c4be0e8241ba356275aed9a848c11dae272f681486e22b1e5a0fba70e2a3f59c66fd538
-
C:\Users\Admin\AppData\Local\Temp\tapestries.dllFilesize
79KB
MD5de483549656bf835dc68066cf8ec272d
SHA14d85bae725f0fa326985a2e2b978561a8e7761e8
SHA2565ff1e02cdb416efe370170341c6fe22d0044c4e7066a06cd62a698735597f85c
SHA512c42fb330a2a916e5a345cdaa4afddd83c6213a69bad6d6ed76aaa4fa5c4be0e8241ba356275aed9a848c11dae272f681486e22b1e5a0fba70e2a3f59c66fd538
-
C:\Users\Admin\AppData\Local\Temp\tapestries.dllFilesize
79KB
MD5de483549656bf835dc68066cf8ec272d
SHA14d85bae725f0fa326985a2e2b978561a8e7761e8
SHA2565ff1e02cdb416efe370170341c6fe22d0044c4e7066a06cd62a698735597f85c
SHA512c42fb330a2a916e5a345cdaa4afddd83c6213a69bad6d6ed76aaa4fa5c4be0e8241ba356275aed9a848c11dae272f681486e22b1e5a0fba70e2a3f59c66fd538
-
C:\Users\Admin\AppData\Local\Temp\tapestries.dllFilesize
79KB
MD5de483549656bf835dc68066cf8ec272d
SHA14d85bae725f0fa326985a2e2b978561a8e7761e8
SHA2565ff1e02cdb416efe370170341c6fe22d0044c4e7066a06cd62a698735597f85c
SHA512c42fb330a2a916e5a345cdaa4afddd83c6213a69bad6d6ed76aaa4fa5c4be0e8241ba356275aed9a848c11dae272f681486e22b1e5a0fba70e2a3f59c66fd538
-
C:\Users\Admin\AppData\Local\Temp\tapestries.dllFilesize
79KB
MD5de483549656bf835dc68066cf8ec272d
SHA14d85bae725f0fa326985a2e2b978561a8e7761e8
SHA2565ff1e02cdb416efe370170341c6fe22d0044c4e7066a06cd62a698735597f85c
SHA512c42fb330a2a916e5a345cdaa4afddd83c6213a69bad6d6ed76aaa4fa5c4be0e8241ba356275aed9a848c11dae272f681486e22b1e5a0fba70e2a3f59c66fd538
-
C:\Users\Admin\AppData\Local\Temp\tweakChkDsk_zh-tw.p5pFilesize
84KB
MD5c71c109ad65b043d3c39fbec8dfca5cb
SHA104b79de74f78dbfe5b6309da7871758ecadf2c8e
SHA256e59c7467b81886e047680ad33fe15940febd5e95a57b575754aad0881934d578
SHA512d2710bb608522006e6b06dfe7f64560a3d6abf5c8132a953a0099908f6321cb2e8de764038ff626c9e34e9d8773ee5b7c7bddebb2e4c720b7ade8a5c6e23d2da
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeFilesize
149KB
MD59128ba0138be09b05ea45364e482d01d
SHA194b47559d6367e2f02f0002810f4cb9cee339fa1
SHA2563777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573
SHA512d677b5db63a188978ebd31ca5a839eedc60f6033cc13839b4df9a067afd85cbf652f1e1d9b66dcb2e699edd5b60b179c9462f74f5b389b80d5381c78a3f56db9
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeFilesize
149KB
MD59128ba0138be09b05ea45364e482d01d
SHA194b47559d6367e2f02f0002810f4cb9cee339fa1
SHA2563777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573
SHA512d677b5db63a188978ebd31ca5a839eedc60f6033cc13839b4df9a067afd85cbf652f1e1d9b66dcb2e699edd5b60b179c9462f74f5b389b80d5381c78a3f56db9
-
C:\Users\Admin\AppData\Roaming\Install\Notepad.exeFilesize
149KB
MD59128ba0138be09b05ea45364e482d01d
SHA194b47559d6367e2f02f0002810f4cb9cee339fa1
SHA2563777a3e8d9718ad94254a20ae962f68a513da63668d8621c2b93a4a582ca9573
SHA512d677b5db63a188978ebd31ca5a839eedc60f6033cc13839b4df9a067afd85cbf652f1e1d9b66dcb2e699edd5b60b179c9462f74f5b389b80d5381c78a3f56db9
-
memory/892-150-0x0000000000000000-mapping.dmp
-
memory/892-155-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1020-141-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1020-138-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1020-136-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1020-135-0x0000000000000000-mapping.dmp
-
memory/1392-134-0x00000000022B0000-0x00000000022CC000-memory.dmpFilesize
112KB
-
memory/4616-149-0x0000000002ED0000-0x0000000002EEC000-memory.dmpFilesize
112KB
-
memory/4616-139-0x0000000000000000-mapping.dmp