Analysis
-
max time kernel
162s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 09:48
Static task
static1
Behavioral task
behavioral1
Sample
461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe
Resource
win10v2004-20220414-en
General
-
Target
461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe
-
Size
696KB
-
MD5
399875e9d324075be8e0bdc9c40db26f
-
SHA1
9444dbe54f9965a47c754853a28ad5ef1ee542ae
-
SHA256
461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51
-
SHA512
68f202fba09a43a7b7eebb15e98933a6a26e530683cd158ef8be78b5ad15e6874da9d3963582631746b9b31cfed19c9047bc5267c57018d0a1494bf5f46df4c7
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1508-83-0x0000000000400000-0x00000000004AE000-memory.dmp netwire behavioral1/memory/1508-84-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1508-91-0x0000000000400000-0x00000000004AE000-memory.dmp netwire behavioral1/memory/1508-93-0x0000000000400000-0x00000000004AE000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
bcvdfgsd.exebcvdfgsd.exepid process 1232 bcvdfgsd.exe 1508 bcvdfgsd.exe -
Loads dropped DLL 2 IoCs
Processes:
461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exepid process 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Net Host = "C:\\Users\\Admin\\vbnfghcbv\\bcvdfgsd.vbs -BN" WScript.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exebcvdfgsd.exebcvdfgsd.exepid process 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe 1232 bcvdfgsd.exe 1508 bcvdfgsd.exe 1508 bcvdfgsd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bcvdfgsd.exedescription pid process target process PID 1232 set thread context of 1508 1232 bcvdfgsd.exe bcvdfgsd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exebcvdfgsd.exepid process 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe 1232 bcvdfgsd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exebcvdfgsd.exedescription pid process target process PID 1744 wrote to memory of 2040 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe WScript.exe PID 1744 wrote to memory of 2040 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe WScript.exe PID 1744 wrote to memory of 2040 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe WScript.exe PID 1744 wrote to memory of 2040 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe WScript.exe PID 1744 wrote to memory of 1232 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe bcvdfgsd.exe PID 1744 wrote to memory of 1232 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe bcvdfgsd.exe PID 1744 wrote to memory of 1232 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe bcvdfgsd.exe PID 1744 wrote to memory of 1232 1744 461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe bcvdfgsd.exe PID 1232 wrote to memory of 1508 1232 bcvdfgsd.exe bcvdfgsd.exe PID 1232 wrote to memory of 1508 1232 bcvdfgsd.exe bcvdfgsd.exe PID 1232 wrote to memory of 1508 1232 bcvdfgsd.exe bcvdfgsd.exe PID 1232 wrote to memory of 1508 1232 bcvdfgsd.exe bcvdfgsd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe"C:\Users\Admin\AppData\Local\Temp\461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\vbnfghcbv\bcvdfgsd.vbs"2⤵
- Adds Run key to start application
PID:2040 -
C:\Users\Admin\vbnfghcbv\bcvdfgsd.exe"C:\Users\Admin\vbnfghcbv\bcvdfgsd.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\vbnfghcbv\bcvdfgsd.exe"C:\Users\Admin\vbnfghcbv\bcvdfgsd.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5399875e9d324075be8e0bdc9c40db26f
SHA19444dbe54f9965a47c754853a28ad5ef1ee542ae
SHA256461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51
SHA51268f202fba09a43a7b7eebb15e98933a6a26e530683cd158ef8be78b5ad15e6874da9d3963582631746b9b31cfed19c9047bc5267c57018d0a1494bf5f46df4c7
-
Filesize
696KB
MD5399875e9d324075be8e0bdc9c40db26f
SHA19444dbe54f9965a47c754853a28ad5ef1ee542ae
SHA256461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51
SHA51268f202fba09a43a7b7eebb15e98933a6a26e530683cd158ef8be78b5ad15e6874da9d3963582631746b9b31cfed19c9047bc5267c57018d0a1494bf5f46df4c7
-
Filesize
696KB
MD5399875e9d324075be8e0bdc9c40db26f
SHA19444dbe54f9965a47c754853a28ad5ef1ee542ae
SHA256461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51
SHA51268f202fba09a43a7b7eebb15e98933a6a26e530683cd158ef8be78b5ad15e6874da9d3963582631746b9b31cfed19c9047bc5267c57018d0a1494bf5f46df4c7
-
Filesize
1020B
MD521cf2e4768afcc318693cbde9a511ab6
SHA1f0ca1f2c3291f0135928b9268050ed3b9268eb8f
SHA256bdd3f2b154f552e55ad74650f1801d5c26abe8916803580021cc193d590f1f4d
SHA512cd5aef4c3220701d4ca6f37cababf3ade051cbf6331183c32aa98a399207144974e30474e3b0bf6ed079fbb1302d771ae943b6f6e1b74ca2f327e473288712a4
-
Filesize
696KB
MD5399875e9d324075be8e0bdc9c40db26f
SHA19444dbe54f9965a47c754853a28ad5ef1ee542ae
SHA256461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51
SHA51268f202fba09a43a7b7eebb15e98933a6a26e530683cd158ef8be78b5ad15e6874da9d3963582631746b9b31cfed19c9047bc5267c57018d0a1494bf5f46df4c7
-
Filesize
696KB
MD5399875e9d324075be8e0bdc9c40db26f
SHA19444dbe54f9965a47c754853a28ad5ef1ee542ae
SHA256461db0bd78da3f5740d355ab5bb72b78411d1d2321bf78101e75dd34fc301b51
SHA51268f202fba09a43a7b7eebb15e98933a6a26e530683cd158ef8be78b5ad15e6874da9d3963582631746b9b31cfed19c9047bc5267c57018d0a1494bf5f46df4c7