Analysis
-
max time kernel
149s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 13:33
Static task
static1
Behavioral task
behavioral1
Sample
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe
Resource
win10v2004-20220414-en
General
-
Target
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe
-
Size
504KB
-
MD5
ca2b658c2635de5b50eaf2a9db941da5
-
SHA1
6b69f3a7437cc4aff6fbed6c7290c5d67811964d
-
SHA256
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b
-
SHA512
79ae2c412892baa2dea2168d662ec373bbd6ea07efd46289c4ccf920715459aa5452209baf4ad9cfab44f57014d66f07295680b81cfc9a1971d26514f4092db3
Malware Config
Extracted
netwire
ddns.catamosky.biz:4668
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
JULY
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Trinidado1@
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4488-141-0x0000000000000000-mapping.dmp netwire behavioral2/memory/4488-144-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4488-145-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4488-146-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
vbc.exevbc.exepid process 4740 vbc.exe 4488 vbc.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation WScript.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\vbc = "C:\\Users\\Admin\\AppData\\Local\\Temp\\skype\\vbc.vbs" WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\Local Settings 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exevbc.exepid process 2424 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe 4740 vbc.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exeWScript.exevbc.exedescription pid process target process PID 2424 wrote to memory of 4388 2424 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe WScript.exe PID 2424 wrote to memory of 4388 2424 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe WScript.exe PID 2424 wrote to memory of 4388 2424 3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe WScript.exe PID 4388 wrote to memory of 4740 4388 WScript.exe vbc.exe PID 4388 wrote to memory of 4740 4388 WScript.exe vbc.exe PID 4388 wrote to memory of 4740 4388 WScript.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe PID 4740 wrote to memory of 4488 4740 vbc.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe"C:\Users\Admin\AppData\Local\Temp\3e0f6cacce5c9bb96d68914bbe5af3a4850988c562d236392fb99814456db40b.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\skype\vbc.vbs"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\skype\vbc.exe"C:\Users\Admin\AppData\Local\Temp\skype\vbc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\skype\vbc.exe"C:\Users\Admin\AppData\Local\Temp\skype\vbc.exe"4⤵
- Executes dropped EXE
PID:4488
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD58c7109c8ad93bf6b87f46a5457059dd4
SHA1467e4b4bfcf01500296e13a325ac2820e9e43123
SHA256c8472b111712a4d8d9533347d463cd07d293d924928d80c3ebb65d6d3984fe3b
SHA51239616a63bb55a9a313fc80e50866796264c575f37a97a41c7d7ed0e420025a0caa8c5b1b81dbce86bb5924894aabb0aae92eb5f99c119178429a084b37c7dd21
-
Filesize
504KB
MD58c7109c8ad93bf6b87f46a5457059dd4
SHA1467e4b4bfcf01500296e13a325ac2820e9e43123
SHA256c8472b111712a4d8d9533347d463cd07d293d924928d80c3ebb65d6d3984fe3b
SHA51239616a63bb55a9a313fc80e50866796264c575f37a97a41c7d7ed0e420025a0caa8c5b1b81dbce86bb5924894aabb0aae92eb5f99c119178429a084b37c7dd21
-
Filesize
504KB
MD58c7109c8ad93bf6b87f46a5457059dd4
SHA1467e4b4bfcf01500296e13a325ac2820e9e43123
SHA256c8472b111712a4d8d9533347d463cd07d293d924928d80c3ebb65d6d3984fe3b
SHA51239616a63bb55a9a313fc80e50866796264c575f37a97a41c7d7ed0e420025a0caa8c5b1b81dbce86bb5924894aabb0aae92eb5f99c119178429a084b37c7dd21
-
Filesize
1024B
MD5d58ccde93895be5c0959350635722206
SHA1a503b4724a27885da1d873d765eafa6881e1a000
SHA2568dbb89ec1dccff9010457f47b53a62d7d2164948cf2b45c60ac00b39666ab970
SHA512bb06d33b038e9b8cbf2cdc231c9e4f82281e33b3da45d3f15d39d4d48ce38c20fe41386d3239bd1ab34301047734adb9a3c26f1101dd73c9ba855264345dc098