Analysis

  • max time kernel
    126s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 17:34

General

  • Target

    86c71d494cab5c45481d958dc3c2a5c98739ca6b26d76fad33eeda5821b54b3d.exe

  • Size

    3.2MB

  • MD5

    b8a9c7e281ca8201f517148ddd307437

  • SHA1

    d4d48ecfa192607d86812a66d3190185cde3693f

  • SHA256

    86c71d494cab5c45481d958dc3c2a5c98739ca6b26d76fad33eeda5821b54b3d

  • SHA512

    1a33b353bd8437b025aee9d73f6ac05bfe8fb96105908c317396de827013ee52b7e9796f8ad745b11d512062196f948aa0bc584742da68645c69839fb93fcefe

Malware Config

Signatures

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86c71d494cab5c45481d958dc3c2a5c98739ca6b26d76fad33eeda5821b54b3d.exe
    "C:\Users\Admin\AppData\Local\Temp\86c71d494cab5c45481d958dc3c2a5c98739ca6b26d76fad33eeda5821b54b3d.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Users\Admin\AppData\Roaming\Photoshops\PSE.exe
      "C:\Users\Admin\AppData\Roaming\Photoshops\PSE.exe" -m "C:\Users\Admin\AppData\Local\Temp\86c71d494cab5c45481d958dc3c2a5c98739ca6b26d76fad33eeda5821b54b3d.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Photoshops\PSE.exe

    Filesize

    3.2MB

    MD5

    b8a9c7e281ca8201f517148ddd307437

    SHA1

    d4d48ecfa192607d86812a66d3190185cde3693f

    SHA256

    86c71d494cab5c45481d958dc3c2a5c98739ca6b26d76fad33eeda5821b54b3d

    SHA512

    1a33b353bd8437b025aee9d73f6ac05bfe8fb96105908c317396de827013ee52b7e9796f8ad745b11d512062196f948aa0bc584742da68645c69839fb93fcefe

  • C:\Users\Admin\AppData\Roaming\Photoshops\PSE.exe

    Filesize

    3.2MB

    MD5

    b8a9c7e281ca8201f517148ddd307437

    SHA1

    d4d48ecfa192607d86812a66d3190185cde3693f

    SHA256

    86c71d494cab5c45481d958dc3c2a5c98739ca6b26d76fad33eeda5821b54b3d

    SHA512

    1a33b353bd8437b025aee9d73f6ac05bfe8fb96105908c317396de827013ee52b7e9796f8ad745b11d512062196f948aa0bc584742da68645c69839fb93fcefe

  • memory/3596-133-0x0000000000000000-mapping.dmp

  • memory/3596-136-0x0000000000400000-0x000000000073F000-memory.dmp

    Filesize

    3.2MB

  • memory/3596-138-0x0000000000BE0000-0x0000000000C05000-memory.dmp

    Filesize

    148KB

  • memory/3596-139-0x0000000000400000-0x000000000073F000-memory.dmp

    Filesize

    3.2MB

  • memory/4880-130-0x0000000000400000-0x000000000073F000-memory.dmp

    Filesize

    3.2MB

  • memory/4880-131-0x00000000024A0000-0x00000000024BB000-memory.dmp

    Filesize

    108KB

  • memory/4880-132-0x00000000024C0000-0x00000000024E5000-memory.dmp

    Filesize

    148KB

  • memory/4880-137-0x0000000000400000-0x000000000073F000-memory.dmp

    Filesize

    3.2MB