Analysis
-
max time kernel
113s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 13:33
Static task
static1
Behavioral task
behavioral1
Sample
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe
Resource
win10v2004-20220414-en
General
-
Target
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe
-
Size
504KB
-
MD5
ca2b658c2635de5b50eaf2a9db941da5
-
SHA1
6b69f3a7437cc4aff6fbed6c7290c5d67811964d
-
SHA256
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b
-
SHA512
79ae2c412892baa2dea2168d662ec373bbd6ea07efd46289c4ccf920715459aa5452209baf4ad9cfab44f57014d66f07295680b81cfc9a1971d26514f4092db3
Malware Config
Extracted
netwire
ddns.catamosky.biz:4668
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
JULY
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Trinidado1@
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2016-70-0x0000000000000000-mapping.dmp netwire behavioral1/memory/2016-72-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2016-75-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2016-76-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/2016-77-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
vbc.exevbc.exepid process 2040 vbc.exe 2016 vbc.exe -
Loads dropped DLL 3 IoCs
Processes:
WScript.exevbc.exepid process 1140 WScript.exe 1140 WScript.exe 2040 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\vbc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\skype\\vbc.vbs" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exevbc.exepid process 1480 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe 2040 vbc.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exeWScript.exevbc.exedescription pid process target process PID 1480 wrote to memory of 1140 1480 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe WScript.exe PID 1480 wrote to memory of 1140 1480 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe WScript.exe PID 1480 wrote to memory of 1140 1480 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe WScript.exe PID 1480 wrote to memory of 1140 1480 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe WScript.exe PID 1140 wrote to memory of 2040 1140 WScript.exe vbc.exe PID 1140 wrote to memory of 2040 1140 WScript.exe vbc.exe PID 1140 wrote to memory of 2040 1140 WScript.exe vbc.exe PID 1140 wrote to memory of 2040 1140 WScript.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe PID 2040 wrote to memory of 2016 2040 vbc.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe"C:\Users\Admin\AppData\Local\Temp\3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\skype\vbc.vbs"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\skype\vbc.exe"C:\Users\Admin\AppData\Local\Temp\skype\vbc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\skype\vbc.exe"C:\Users\Admin\AppData\Local\Temp\skype\vbc.exe"4⤵
- Executes dropped EXE
PID:2016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD58c7109c8ad93bf6b87f46a5457059dd4
SHA1467e4b4bfcf01500296e13a325ac2820e9e43123
SHA256c8472b111712a4d8d9533347d463cd07d293d924928d80c3ebb65d6d3984fe3b
SHA51239616a63bb55a9a313fc80e50866796264c575f37a97a41c7d7ed0e420025a0caa8c5b1b81dbce86bb5924894aabb0aae92eb5f99c119178429a084b37c7dd21
-
Filesize
504KB
MD58c7109c8ad93bf6b87f46a5457059dd4
SHA1467e4b4bfcf01500296e13a325ac2820e9e43123
SHA256c8472b111712a4d8d9533347d463cd07d293d924928d80c3ebb65d6d3984fe3b
SHA51239616a63bb55a9a313fc80e50866796264c575f37a97a41c7d7ed0e420025a0caa8c5b1b81dbce86bb5924894aabb0aae92eb5f99c119178429a084b37c7dd21
-
Filesize
504KB
MD58c7109c8ad93bf6b87f46a5457059dd4
SHA1467e4b4bfcf01500296e13a325ac2820e9e43123
SHA256c8472b111712a4d8d9533347d463cd07d293d924928d80c3ebb65d6d3984fe3b
SHA51239616a63bb55a9a313fc80e50866796264c575f37a97a41c7d7ed0e420025a0caa8c5b1b81dbce86bb5924894aabb0aae92eb5f99c119178429a084b37c7dd21
-
Filesize
1024B
MD5d58ccde93895be5c0959350635722206
SHA1a503b4724a27885da1d873d765eafa6881e1a000
SHA2568dbb89ec1dccff9010457f47b53a62d7d2164948cf2b45c60ac00b39666ab970
SHA512bb06d33b038e9b8cbf2cdc231c9e4f82281e33b3da45d3f15d39d4d48ce38c20fe41386d3239bd1ab34301047734adb9a3c26f1101dd73c9ba855264345dc098
-
Filesize
504KB
MD58c7109c8ad93bf6b87f46a5457059dd4
SHA1467e4b4bfcf01500296e13a325ac2820e9e43123
SHA256c8472b111712a4d8d9533347d463cd07d293d924928d80c3ebb65d6d3984fe3b
SHA51239616a63bb55a9a313fc80e50866796264c575f37a97a41c7d7ed0e420025a0caa8c5b1b81dbce86bb5924894aabb0aae92eb5f99c119178429a084b37c7dd21
-
Filesize
504KB
MD58c7109c8ad93bf6b87f46a5457059dd4
SHA1467e4b4bfcf01500296e13a325ac2820e9e43123
SHA256c8472b111712a4d8d9533347d463cd07d293d924928d80c3ebb65d6d3984fe3b
SHA51239616a63bb55a9a313fc80e50866796264c575f37a97a41c7d7ed0e420025a0caa8c5b1b81dbce86bb5924894aabb0aae92eb5f99c119178429a084b37c7dd21
-
Filesize
504KB
MD58c7109c8ad93bf6b87f46a5457059dd4
SHA1467e4b4bfcf01500296e13a325ac2820e9e43123
SHA256c8472b111712a4d8d9533347d463cd07d293d924928d80c3ebb65d6d3984fe3b
SHA51239616a63bb55a9a313fc80e50866796264c575f37a97a41c7d7ed0e420025a0caa8c5b1b81dbce86bb5924894aabb0aae92eb5f99c119178429a084b37c7dd21