Analysis
-
max time kernel
132s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 11:11
Static task
static1
Behavioral task
behavioral1
Sample
b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe
Resource
win10v2004-20220414-en
General
-
Target
b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe
-
Size
168KB
-
MD5
3f703f81f4a4c842cdc0703a72c2b962
-
SHA1
014c9705a2cb162435ed8f59990414c0d1c8bb68
-
SHA256
b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e
-
SHA512
ec266ae10cbbcc86581cb96d0fec1ecb0ef2cb76e13c116efde0adcdb11eb5943eb638f80d5ef39bfb0a070d9a8137bf03855820f758ea033109b9335db6a3ec
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\RedTools\\networker.exe\"" networker.exe -
resource yara_rule behavioral1/memory/548-57-0x0000000000020000-0x000000000002A000-memory.dmp buer behavioral1/memory/548-58-0x0000000040000000-0x00000000429E0000-memory.dmp buer behavioral1/memory/1508-68-0x0000000040000000-0x00000000429E0000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1508 networker.exe -
Deletes itself 1 IoCs
pid Process 1508 networker.exe -
Loads dropped DLL 2 IoCs
pid Process 548 b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe 548 b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: networker.exe File opened (read-only) \??\R: networker.exe File opened (read-only) \??\H: networker.exe File opened (read-only) \??\J: networker.exe File opened (read-only) \??\N: networker.exe File opened (read-only) \??\Q: networker.exe File opened (read-only) \??\E: networker.exe File opened (read-only) \??\F: networker.exe File opened (read-only) \??\I: networker.exe File opened (read-only) \??\L: networker.exe File opened (read-only) \??\S: networker.exe File opened (read-only) \??\U: networker.exe File opened (read-only) \??\V: networker.exe File opened (read-only) \??\W: networker.exe File opened (read-only) \??\A: networker.exe File opened (read-only) \??\X: networker.exe File opened (read-only) \??\G: networker.exe File opened (read-only) \??\M: networker.exe File opened (read-only) \??\O: networker.exe File opened (read-only) \??\P: networker.exe File opened (read-only) \??\T: networker.exe File opened (read-only) \??\Y: networker.exe File opened (read-only) \??\Z: networker.exe File opened (read-only) \??\B: networker.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1268 1420 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1508 networker.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 548 wrote to memory of 1508 548 b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe 27 PID 548 wrote to memory of 1508 548 b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe 27 PID 548 wrote to memory of 1508 548 b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe 27 PID 548 wrote to memory of 1508 548 b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe 27 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1508 wrote to memory of 1420 1508 networker.exe 28 PID 1420 wrote to memory of 1268 1420 secinit.exe 29 PID 1420 wrote to memory of 1268 1420 secinit.exe 29 PID 1420 wrote to memory of 1268 1420 secinit.exe 29 PID 1420 wrote to memory of 1268 1420 secinit.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe"C:\Users\Admin\AppData\Local\Temp\b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:548 -
C:\ProgramData\RedTools\networker.exeC:\ProgramData\RedTools\networker.exe "C:\Users\Admin\AppData\Local\Temp\b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\RedTools\networker.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 1364⤵
- Program crash
PID:1268
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD53f703f81f4a4c842cdc0703a72c2b962
SHA1014c9705a2cb162435ed8f59990414c0d1c8bb68
SHA256b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e
SHA512ec266ae10cbbcc86581cb96d0fec1ecb0ef2cb76e13c116efde0adcdb11eb5943eb638f80d5ef39bfb0a070d9a8137bf03855820f758ea033109b9335db6a3ec
-
Filesize
168KB
MD53f703f81f4a4c842cdc0703a72c2b962
SHA1014c9705a2cb162435ed8f59990414c0d1c8bb68
SHA256b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e
SHA512ec266ae10cbbcc86581cb96d0fec1ecb0ef2cb76e13c116efde0adcdb11eb5943eb638f80d5ef39bfb0a070d9a8137bf03855820f758ea033109b9335db6a3ec
-
Filesize
168KB
MD53f703f81f4a4c842cdc0703a72c2b962
SHA1014c9705a2cb162435ed8f59990414c0d1c8bb68
SHA256b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e
SHA512ec266ae10cbbcc86581cb96d0fec1ecb0ef2cb76e13c116efde0adcdb11eb5943eb638f80d5ef39bfb0a070d9a8137bf03855820f758ea033109b9335db6a3ec
-
Filesize
168KB
MD53f703f81f4a4c842cdc0703a72c2b962
SHA1014c9705a2cb162435ed8f59990414c0d1c8bb68
SHA256b8214a4193ab2e9ad46cc908789a17bc2c78cd4fa215b5311e7908caabb3ea6e
SHA512ec266ae10cbbcc86581cb96d0fec1ecb0ef2cb76e13c116efde0adcdb11eb5943eb638f80d5ef39bfb0a070d9a8137bf03855820f758ea033109b9335db6a3ec