Analysis
-
max time kernel
151s -
max time network
190s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 17:01
Static task
static1
Behavioral task
behavioral1
Sample
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe
Resource
win10v2004-20220414-en
General
-
Target
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe
-
Size
632KB
-
MD5
103103bcf0df850da224b5ec97ef91e9
-
SHA1
cf9a21010fc1bc58da283626e85c2e375d37483c
-
SHA256
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b
-
SHA512
d2f34f4debb92b176b581e31b420cf7e0478db3ca6fe47b48fa80213c849d574afca4f16d7598bdd057d04bfc453e4aeb694c2023c8377b295985f439774df6a
Malware Config
Extracted
netwire
xmpphosts.ru:3367
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
mutex
oOdvssQB
-
offline_keylogger
false
-
password
456123xyz
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/908-70-0x0000000000000000-mapping.dmp netwire behavioral1/memory/908-72-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/908-76-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral1/memory/908-77-0x0000000000401000-0x000000000042C000-memory.dmp netwire behavioral1/memory/908-78-0x0000000000401000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
WinRAR.exeWinRAR.exepid process 1980 WinRAR.exe 908 WinRAR.exe -
Loads dropped DLL 3 IoCs
Processes:
WScript.exeWinRAR.exepid process 1988 WScript.exe 1988 WScript.exe 1980 WinRAR.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\WinRAR = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinRAR\\WinRAR.vbs" WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
WinRAR.exedescription pid process target process PID 1980 set thread context of 908 1980 WinRAR.exe WinRAR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exeWinRAR.exepid process 1084 452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe 1980 WinRAR.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exeWScript.exeWinRAR.exedescription pid process target process PID 1084 wrote to memory of 1988 1084 452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe WScript.exe PID 1084 wrote to memory of 1988 1084 452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe WScript.exe PID 1084 wrote to memory of 1988 1084 452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe WScript.exe PID 1084 wrote to memory of 1988 1084 452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe WScript.exe PID 1988 wrote to memory of 1980 1988 WScript.exe WinRAR.exe PID 1988 wrote to memory of 1980 1988 WScript.exe WinRAR.exe PID 1988 wrote to memory of 1980 1988 WScript.exe WinRAR.exe PID 1988 wrote to memory of 1980 1988 WScript.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe PID 1980 wrote to memory of 908 1980 WinRAR.exe WinRAR.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe"C:\Users\Admin\AppData\Local\Temp\452325d71755ddf18b6495ae9a8b1599319e302ef1f57a8200ec94ff02c73f8b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\WinRAR\WinRAR.vbs"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\WinRAR\WinRAR.exe"C:\Users\Admin\AppData\Local\Temp\WinRAR\WinRAR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\WinRAR\WinRAR.exe"C:\Users\Admin\AppData\Local\Temp\WinRAR\WinRAR.exe"4⤵
- Executes dropped EXE
PID:908
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632KB
MD54a4b586191e94bd493f0011da24edf01
SHA12de9ac2e82741c30f858438a0f3e60893cd1cb1c
SHA256b2ccb0af4ba827b2595d3501be326f847f74b4a9b8b009e7274d29bd51a28292
SHA5122ed1bf93899e58a87bc1eee24258f5a12d6a139cf15d40d949b9c11a242be46bbe8442b73c212389801b26ce961c8ee288ed5c9d97cf4d0bcd2f8e1190b291d8
-
Filesize
632KB
MD54a4b586191e94bd493f0011da24edf01
SHA12de9ac2e82741c30f858438a0f3e60893cd1cb1c
SHA256b2ccb0af4ba827b2595d3501be326f847f74b4a9b8b009e7274d29bd51a28292
SHA5122ed1bf93899e58a87bc1eee24258f5a12d6a139cf15d40d949b9c11a242be46bbe8442b73c212389801b26ce961c8ee288ed5c9d97cf4d0bcd2f8e1190b291d8
-
Filesize
632KB
MD54a4b586191e94bd493f0011da24edf01
SHA12de9ac2e82741c30f858438a0f3e60893cd1cb1c
SHA256b2ccb0af4ba827b2595d3501be326f847f74b4a9b8b009e7274d29bd51a28292
SHA5122ed1bf93899e58a87bc1eee24258f5a12d6a139cf15d40d949b9c11a242be46bbe8442b73c212389801b26ce961c8ee288ed5c9d97cf4d0bcd2f8e1190b291d8
-
Filesize
1024B
MD523f6a019b4c5a5d8d30284e029670ca1
SHA13750537e50d127d45e33cda44b726d002a93975b
SHA256eb355d1019c118e38d8f319249c4e118a24d2e19d720587f49b1ee8d864d2d26
SHA512fafb39e4426f97f3ac5817a76f10cfad8487d93618f737c4b359f1511d376076bc8d834e3df61c9c113243cfe60e1687d87559847a306e19e4406e1f5921eec0
-
Filesize
632KB
MD54a4b586191e94bd493f0011da24edf01
SHA12de9ac2e82741c30f858438a0f3e60893cd1cb1c
SHA256b2ccb0af4ba827b2595d3501be326f847f74b4a9b8b009e7274d29bd51a28292
SHA5122ed1bf93899e58a87bc1eee24258f5a12d6a139cf15d40d949b9c11a242be46bbe8442b73c212389801b26ce961c8ee288ed5c9d97cf4d0bcd2f8e1190b291d8
-
Filesize
632KB
MD54a4b586191e94bd493f0011da24edf01
SHA12de9ac2e82741c30f858438a0f3e60893cd1cb1c
SHA256b2ccb0af4ba827b2595d3501be326f847f74b4a9b8b009e7274d29bd51a28292
SHA5122ed1bf93899e58a87bc1eee24258f5a12d6a139cf15d40d949b9c11a242be46bbe8442b73c212389801b26ce961c8ee288ed5c9d97cf4d0bcd2f8e1190b291d8
-
Filesize
632KB
MD54a4b586191e94bd493f0011da24edf01
SHA12de9ac2e82741c30f858438a0f3e60893cd1cb1c
SHA256b2ccb0af4ba827b2595d3501be326f847f74b4a9b8b009e7274d29bd51a28292
SHA5122ed1bf93899e58a87bc1eee24258f5a12d6a139cf15d40d949b9c11a242be46bbe8442b73c212389801b26ce961c8ee288ed5c9d97cf4d0bcd2f8e1190b291d8