Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-07-2022 00:04
Static task
static1
Behavioral task
behavioral1
Sample
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe
Resource
win7-20220414-en
General
-
Target
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe
-
Size
1.2MB
-
MD5
87c6e46715878db1236b4d02ed40b1b2
-
SHA1
3554b9a38df7f61ece5292a6dd7ba1d13733f2ad
-
SHA256
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a
-
SHA512
6c6d43dadd24f251385efb04e10e4be390c6bbed6e9168e052b2e2afe0644482117b514f1d1e940ccc99141ad59bb9104d10352ce1b7cdbf841cdb5346742a69
Malware Config
Extracted
netwire
79.134.225.73:1968
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
pd1n9
-
lock_executable
false
-
mutex
KHAtGUwc
-
offline_keylogger
false
-
password
Kimbolsapoq!P13
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2432-133-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Drops startup file 1 IoCs
Processes:
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FXSUNATD.lnk 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exedescription pid process target process PID 4264 set thread context of 2432 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exepid process 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exepid process 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exepid process 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exepid process 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exedescription pid process target process PID 4264 wrote to memory of 1452 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe svchost.exe PID 4264 wrote to memory of 1452 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe svchost.exe PID 4264 wrote to memory of 1452 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe svchost.exe PID 4264 wrote to memory of 2432 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe svchost.exe PID 4264 wrote to memory of 2432 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe svchost.exe PID 4264 wrote to memory of 2432 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe svchost.exe PID 4264 wrote to memory of 2432 4264 49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe"C:\Users\Admin\AppData\Local\Temp\49593d50b98d8ab429704387e7a1663c5aa53aed6c007c17e960a7a3d435e72a.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:1452
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵PID:2432