Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-07-2022 02:33
Static task
static1
Behavioral task
behavioral1
Sample
4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe
Resource
win10v2004-20220414-en
General
-
Target
4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe
-
Size
935KB
-
MD5
8a8730a80f703191573763ef36cfa582
-
SHA1
14a03c871c60459343c6be5d160af9482dc64990
-
SHA256
4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106
-
SHA512
ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1
Malware Config
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1392-62-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1392-63-0x0000000000402196-mapping.dmp netwire behavioral1/memory/1392-66-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1392-69-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2044-83-0x0000000000402196-mapping.dmp netwire behavioral1/memory/2044-88-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
Processes:
Host.exeHost.exeHost.exepid process 1308 Host.exe 1868 Host.exe 2044 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exeHost.exepid process 1392 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 1308 Host.exe -
AutoIT Executable 6 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe \Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exeHost.exedescription pid process target process PID 964 set thread context of 1392 964 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 1868 set thread context of 2044 1868 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exeHost.exepid process 964 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 1868 Host.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exeHost.exeHost.exedescription pid process target process PID 1416 wrote to memory of 964 1416 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 1416 wrote to memory of 964 1416 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 1416 wrote to memory of 964 1416 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 1416 wrote to memory of 964 1416 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 964 wrote to memory of 1392 964 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 964 wrote to memory of 1392 964 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 964 wrote to memory of 1392 964 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 964 wrote to memory of 1392 964 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 964 wrote to memory of 1392 964 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 964 wrote to memory of 1392 964 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe PID 1392 wrote to memory of 1308 1392 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe Host.exe PID 1392 wrote to memory of 1308 1392 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe Host.exe PID 1392 wrote to memory of 1308 1392 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe Host.exe PID 1392 wrote to memory of 1308 1392 4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe Host.exe PID 1308 wrote to memory of 1868 1308 Host.exe Host.exe PID 1308 wrote to memory of 1868 1308 Host.exe Host.exe PID 1308 wrote to memory of 1868 1308 Host.exe Host.exe PID 1308 wrote to memory of 1868 1308 Host.exe Host.exe PID 1868 wrote to memory of 2044 1868 Host.exe Host.exe PID 1868 wrote to memory of 2044 1868 Host.exe Host.exe PID 1868 wrote to memory of 2044 1868 Host.exe Host.exe PID 1868 wrote to memory of 2044 1868 Host.exe Host.exe PID 1868 wrote to memory of 2044 1868 Host.exe Host.exe PID 1868 wrote to memory of 2044 1868 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe"C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe"C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe" /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\712257" "C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe"C:\Users\Admin\AppData\Local\Temp\4d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" /AutoIt3ExecuteScript "C:\Users\Admin\AppData\Local\Temp\531595" "C:\Users\Admin\AppData\Roaming\Install\Host.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"6⤵
- Executes dropped EXE
PID:2044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD5b4b6e1a5e7180978de200c580cf1d734
SHA1fa8a97514052d19f61f04fc172d7b6b761e1de0e
SHA2567f4b0ec03a904819fbfa82854db369f9f16d689aea1f582f0a5c984102c997c2
SHA51217368a053229f7e7602f4db05ff8a1f73e911043d88b52cb7b88143abf8f689ac5aa8288e46a04f31e67be0a5cb34c6f1cd64155ed1ba09974684e089c224f0f
-
Filesize
15KB
MD5b4b6e1a5e7180978de200c580cf1d734
SHA1fa8a97514052d19f61f04fc172d7b6b761e1de0e
SHA2567f4b0ec03a904819fbfa82854db369f9f16d689aea1f582f0a5c984102c997c2
SHA51217368a053229f7e7602f4db05ff8a1f73e911043d88b52cb7b88143abf8f689ac5aa8288e46a04f31e67be0a5cb34c6f1cd64155ed1ba09974684e089c224f0f
-
Filesize
12KB
MD5fcaa757b4fc32b9c0c66fe31b0de5376
SHA1472bc2e27449278786857bfe609c868127606c3f
SHA256c413b175de5a10cc23eff47d24279b269b3caf5e45d0f1de1ca645c4381fbac9
SHA512ef6186305b43fc0e42cebaac82f123b83be7077a5dd1004bb9b4f82c95da57230b35a24f787ee8e63ed397e91660cfb40c1338f69c68bc7dbce381b53fe4f61c
-
Filesize
12KB
MD5fcaa757b4fc32b9c0c66fe31b0de5376
SHA1472bc2e27449278786857bfe609c868127606c3f
SHA256c413b175de5a10cc23eff47d24279b269b3caf5e45d0f1de1ca645c4381fbac9
SHA512ef6186305b43fc0e42cebaac82f123b83be7077a5dd1004bb9b4f82c95da57230b35a24f787ee8e63ed397e91660cfb40c1338f69c68bc7dbce381b53fe4f61c
-
Filesize
81KB
MD54e76352622ea62b29ade0aaad1dd0bef
SHA1cb5600c7efbf41307e7aa0113426584a3cedcdd6
SHA2565657ec0860a803483e999ee839c70cbcc79a9f9f1c6b72a2cd9f397f12f57d23
SHA51293201e9b209ad70ec002d264a78d2b6e43a497b99b3d03e448d7403efd278d71f0a319741631b695ad87fb76469ce03fb7f4f2e4976946842a5f5cbf62e41ff3
-
Filesize
81KB
MD54e76352622ea62b29ade0aaad1dd0bef
SHA1cb5600c7efbf41307e7aa0113426584a3cedcdd6
SHA2565657ec0860a803483e999ee839c70cbcc79a9f9f1c6b72a2cd9f397f12f57d23
SHA51293201e9b209ad70ec002d264a78d2b6e43a497b99b3d03e448d7403efd278d71f0a319741631b695ad87fb76469ce03fb7f4f2e4976946842a5f5cbf62e41ff3
-
Filesize
935KB
MD58a8730a80f703191573763ef36cfa582
SHA114a03c871c60459343c6be5d160af9482dc64990
SHA2564d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106
SHA512ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1
-
Filesize
935KB
MD58a8730a80f703191573763ef36cfa582
SHA114a03c871c60459343c6be5d160af9482dc64990
SHA2564d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106
SHA512ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1
-
Filesize
935KB
MD58a8730a80f703191573763ef36cfa582
SHA114a03c871c60459343c6be5d160af9482dc64990
SHA2564d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106
SHA512ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1
-
Filesize
935KB
MD58a8730a80f703191573763ef36cfa582
SHA114a03c871c60459343c6be5d160af9482dc64990
SHA2564d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106
SHA512ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1
-
Filesize
935KB
MD58a8730a80f703191573763ef36cfa582
SHA114a03c871c60459343c6be5d160af9482dc64990
SHA2564d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106
SHA512ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1
-
Filesize
935KB
MD58a8730a80f703191573763ef36cfa582
SHA114a03c871c60459343c6be5d160af9482dc64990
SHA2564d90dc38718256408ca49d411ac8e18730b22ce871f458c2acafeb3525fff106
SHA512ba59c1a7c9c519996e62c92cc70a1371569c81bd29c7e45c271fd58d5592a08ff42a47ed759de066b86b8095c5c45f1227b2d11509e51a003385371274d439a1