Analysis
-
max time kernel
128s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2022 11:58
Static task
static1
Behavioral task
behavioral1
Sample
Receipt.exe
Resource
win7-20220718-en
General
-
Target
Receipt.exe
-
Size
1.1MB
-
MD5
92220ac479344c60ae11a3d8c74a2b36
-
SHA1
c8170dcc4766b603e6cad4d854f9ec3b7c4dcce2
-
SHA256
e1a77fa5285413469295dae451a81e68613360acbd05c127701e6e289279acfd
-
SHA512
cc1b11100fcb419a94b33215cad1949778e9e694977c09d77e384269ef9a012aba7d107cd00acd84c0a5114773b1a3c8e11e262e779e78624fcda318eb29c43f
Malware Config
Extracted
netwire
185.140.53.61:3363
185.140.53.61:3365
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
move4ward
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1764-141-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/1764-143-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/1764-144-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/1764-145-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
Receipt.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Receipt.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
Receipt.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Receipt.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Receipt.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Receipt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Receipt.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Receipt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1178428168-2939480073-3055857545-1000\Control Panel\International\Geo\Nation Receipt.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Receipt.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Receipt.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Receipt.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Receipt.exedescription pid process target process PID 3436 set thread context of 1764 3436 Receipt.exe Receipt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Receipt.exepid process 3436 Receipt.exe 3436 Receipt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Receipt.exedescription pid process Token: SeDebugPrivilege 3436 Receipt.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Receipt.exedescription pid process target process PID 3436 wrote to memory of 952 3436 Receipt.exe schtasks.exe PID 3436 wrote to memory of 952 3436 Receipt.exe schtasks.exe PID 3436 wrote to memory of 952 3436 Receipt.exe schtasks.exe PID 3436 wrote to memory of 1732 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1732 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1732 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe PID 3436 wrote to memory of 1764 3436 Receipt.exe Receipt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Receipt.exe"C:\Users\Admin\AppData\Local\Temp\Receipt.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cPbvjkpUOOc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp632E.tmp"2⤵
- Creates scheduled task(s)
PID:952 -
C:\Users\Admin\AppData\Local\Temp\Receipt.exe"{path}"2⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\Receipt.exe"{path}"2⤵PID:1764
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5748f2d38c6219eb5bc5e1fb1d544a5ef
SHA19bf0e27074a7be4aa4366c00c3bf81644751b86d
SHA256235c5a0214282e0a5571db1b035129e59bf2c763ddb4bfa05f26aca73ab677ec
SHA512efc15340027f7441e1ac037f58799298467464366871b3e0c396c31e3279211a66f9e1bff8821d707a4c835a2d5b6943ed47776ccb5b7a8feed50cef98b45c00