Analysis
-
max time kernel
92s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 04:16
Static task
static1
Behavioral task
behavioral1
Sample
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe
Resource
win10v2004-20220414-en
General
-
Target
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe
-
Size
764KB
-
MD5
c8ad3f500f51ba6f32971496d3fd605e
-
SHA1
0677951661b11e2fc5f35e9f5e1ed8d964b8ab79
-
SHA256
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4
-
SHA512
c9a6bb7ca9162d7bdb61ffe332fc09388eb1f24d4bd203363aa35b308e0416d4328a228ef9a578ad2176385dc37668df0ed039104917dd0e7f9a9329626fe350
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/772-90-0x0000000000400000-0x0000000000489000-memory.dmp netwire behavioral1/memory/772-91-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/772-97-0x0000000000400000-0x0000000000489000-memory.dmp netwire behavioral1/memory/772-98-0x0000000000400000-0x0000000000489000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
Processes:
PVDFGH~1.EXExcvxcvzzx.exexcvxcvzzx.exepid process 1720 PVDFGH~1.EXE 1588 xcvxcvzzx.exe 772 xcvxcvzzx.exe -
Loads dropped DLL 2 IoCs
Processes:
PVDFGH~1.EXEpid process 1720 PVDFGH~1.EXE 1720 PVDFGH~1.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
WScript.exe620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\xgfdsyhbv = "C:\\Users\\Admin\\ bxgfbxcx\\xcvxcvzzx.vbs -BN" WScript.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce 620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
PVDFGH~1.EXExcvxcvzzx.exexcvxcvzzx.exepid process 1720 PVDFGH~1.EXE 1588 xcvxcvzzx.exe 772 xcvxcvzzx.exe 772 xcvxcvzzx.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
xcvxcvzzx.exedescription pid process target process PID 1588 set thread context of 772 1588 xcvxcvzzx.exe xcvxcvzzx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
PVDFGH~1.EXExcvxcvzzx.exepid process 1720 PVDFGH~1.EXE 1588 xcvxcvzzx.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exePVDFGH~1.EXExcvxcvzzx.exedescription pid process target process PID 1348 wrote to memory of 1720 1348 620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe PVDFGH~1.EXE PID 1348 wrote to memory of 1720 1348 620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe PVDFGH~1.EXE PID 1348 wrote to memory of 1720 1348 620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe PVDFGH~1.EXE PID 1348 wrote to memory of 1720 1348 620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe PVDFGH~1.EXE PID 1720 wrote to memory of 1632 1720 PVDFGH~1.EXE WScript.exe PID 1720 wrote to memory of 1632 1720 PVDFGH~1.EXE WScript.exe PID 1720 wrote to memory of 1632 1720 PVDFGH~1.EXE WScript.exe PID 1720 wrote to memory of 1632 1720 PVDFGH~1.EXE WScript.exe PID 1720 wrote to memory of 1588 1720 PVDFGH~1.EXE xcvxcvzzx.exe PID 1720 wrote to memory of 1588 1720 PVDFGH~1.EXE xcvxcvzzx.exe PID 1720 wrote to memory of 1588 1720 PVDFGH~1.EXE xcvxcvzzx.exe PID 1720 wrote to memory of 1588 1720 PVDFGH~1.EXE xcvxcvzzx.exe PID 1588 wrote to memory of 772 1588 xcvxcvzzx.exe xcvxcvzzx.exe PID 1588 wrote to memory of 772 1588 xcvxcvzzx.exe xcvxcvzzx.exe PID 1588 wrote to memory of 772 1588 xcvxcvzzx.exe xcvxcvzzx.exe PID 1588 wrote to memory of 772 1588 xcvxcvzzx.exe xcvxcvzzx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe"C:\Users\Admin\AppData\Local\Temp\620e3ddb7798b06de3a93b5df78a5838345f7a4e7ca0b9c9d21623d2010026b4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PVDFGH~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PVDFGH~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\ bxgfbxcx\xcvxcvzzx.vbs"3⤵
- Adds Run key to start application
PID:1632 -
C:\Users\Admin\ bxgfbxcx\xcvxcvzzx.exe"C:\Users\Admin\ bxgfbxcx\xcvxcvzzx.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\ bxgfbxcx\xcvxcvzzx.exe"C:\Users\Admin\ bxgfbxcx\xcvxcvzzx.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174.4MB
MD5c975427284fb4ef9797fe26d0edd6b13
SHA1c69e20a7bb5f713e077a5db39abac5d524ca54c1
SHA2563e6f90e273f3ac57be64a25026af51b6feaafbb6c6b116536dc309231ea391f9
SHA512e3c2f3f102ef113667abc8997fe49b594a35f965d632fe19806e8234e0afe9d88efbfadfe47a81c6c744008dc28f48a2ece4589942fc33d967be0142eccef627
-
Filesize
173.5MB
MD53cbf6c7a91b94a5cf248cfe2d685dbc3
SHA13e2ad0e1d8d51ba420c7afa05db59e755707f88e
SHA2562e9c94904c34a618eb9e86f9541c9f5481cc7447ca28e5aacb2cb7608af51446
SHA51241556eef1a158244f065970ff06622fdc902fd6aa044d62f7949b0bea51b9fd123b1e31d06beb8a30af3c95e49c9b50e3d9ad70e6a82519d320a5dae40f563c1
-
Filesize
172.8MB
MD5a7b75d953c924c27e057fbc83bd3a8d3
SHA12c236b4145f948f60a1e2a8d2c09e2d0ca82362c
SHA256fe2acb80ed0e14a422a580fa847dccc696c9c50406dde1d2c9222498ab449c71
SHA512dc4bacc5642a4cd94bff22af7db0f91165fce72cc62672e324c6cc9b1de6f66ffd6fc2635627130c537e1f921c7263e84c7557109040da247ce5fac581ed0173
-
Filesize
1020B
MD57e55ee0e84b1433f9a2ce0ad5c46f39f
SHA1e8e41756ac7013c8b056739a0cdc8935a3f86495
SHA256bb69ddb2d1f7de172d4081b14326b13b801017e8e1b8f273e2425db7ba8f316c
SHA51213d33c377085ac7638ed7061c65a949bdb35b6856258a26ee0653456938e0f1b79f6a34de3b0dc3706cb2fe30e6a12de8edb8c6c81186c4a7f625ea22a26b2d0
-
Filesize
203.2MB
MD5e6ff594bdab0f4a284f0144732c37c02
SHA1c42edabe72090b00a76b8a88123fcf32b2946586
SHA2561ca0c8d88526c031af6b5240a0957b46f72d58d0bdd2d73dd525feefc6616703
SHA512ffa3f4b00b58f0dbb7f91a9296f8ae5b7e4e23548417065c514241388c5524670be1e372da81fb04579fce52a97ab4c758278905142d59d5ab584db83ae84d04
-
Filesize
176.6MB
MD5c9455b322272bfd114ead9097deaff8d
SHA197a6e79585b7c49d22acd2d91da88c228077f4df
SHA256d87c231f0c9b52ece27a1054a44883735636a83182e33ff387e10ed20941d004
SHA5124941635a195cd73a5f4422e085c0b71fde7298e435e03e0993c4c4aaef5d04241380181c71ebc930a8ecbea25ec348ec07498f749d803743d17257cdbc47d9e9
-
Filesize
176.2MB
MD52d0453105a4e84d335ceb9938e549f29
SHA1d7b3e22b982767de25f068da1cb77490bef5908b
SHA25643148b17b19a817aa70c1459354bc76e61aa3eb68bc401b68fc1dd1a7a9b17a3
SHA512bbf8fb1cc099a789310ef88a28f249a2023e8da53f2468f96408ee4eb2e2fbac81f121cc0038380207d2c7e251fe5c0378fd2733007daebc7b595e2ddb89f31b
-
Filesize
176.4MB
MD5fe44c1105547cf820cbeb510e48257f2
SHA161b96bf119acf1ff008a66b459fd75879c27af29
SHA256ceb5edfc650d104472753cf4339f2f2b6f79ca5748c7e57c4a400287c732019c
SHA5127e58a9b46c38ba4241aa50198bcd704543c67d7f4de2d5a3365d13641a94c9714ec5a88ad7b53f29c0d6a2409d57f7213ad51a565e33347637246a1bb7283a51