Analysis
-
max time kernel
129s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
19-07-2022 11:58
Static task
static1
Behavioral task
behavioral1
Sample
Receipt.exe
Resource
win7-20220718-en
General
-
Target
Receipt.exe
-
Size
1.1MB
-
MD5
92220ac479344c60ae11a3d8c74a2b36
-
SHA1
c8170dcc4766b603e6cad4d854f9ec3b7c4dcce2
-
SHA256
e1a77fa5285413469295dae451a81e68613360acbd05c127701e6e289279acfd
-
SHA512
cc1b11100fcb419a94b33215cad1949778e9e694977c09d77e384269ef9a012aba7d107cd00acd84c0a5114773b1a3c8e11e262e779e78624fcda318eb29c43f
Malware Config
Extracted
netwire
185.140.53.61:3363
185.140.53.61:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
move4ward
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1816-66-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1816-67-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1816-70-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1816-68-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1816-71-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1816-72-0x000000000040242D-mapping.dmp netwire behavioral1/memory/1816-75-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1816-76-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1816-77-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
Receipt.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Receipt.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
Receipt.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Receipt.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Receipt.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Receipt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Receipt.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Receipt.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Receipt.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Receipt.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Receipt.exedescription pid process target process PID 756 set thread context of 1816 756 Receipt.exe Receipt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Receipt.exedescription pid process target process PID 756 wrote to memory of 1820 756 Receipt.exe schtasks.exe PID 756 wrote to memory of 1820 756 Receipt.exe schtasks.exe PID 756 wrote to memory of 1820 756 Receipt.exe schtasks.exe PID 756 wrote to memory of 1820 756 Receipt.exe schtasks.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe PID 756 wrote to memory of 1816 756 Receipt.exe Receipt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Receipt.exe"C:\Users\Admin\AppData\Local\Temp\Receipt.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cPbvjkpUOOc" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC939.tmp"2⤵
- Creates scheduled task(s)
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Receipt.exe"{path}"2⤵PID:1816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d20a616715520df4a12d3ddb7cb289cf
SHA13a670f431c4df3a6a2bfb1936d6cf483abf99405
SHA2561cc5ed0a751797a4a1108c60f012a5a64eda8fcc8bea5773a3abe442f19a6205
SHA512f893b6703910cb51384a6dccb205008dab8fc8985d66720d243be2fef79e75f1371e3b79576f09505fd3223faf8a798ae6f01fe46f61de83a107a963e18e2b7a