Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 17:29
Static task
static1
Behavioral task
behavioral1
Sample
b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe
Resource
win10v2004-20220721-en
General
-
Target
b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe
-
Size
856KB
-
MD5
cf23e46ba9d3c1c3f3fe501e94c6d39e
-
SHA1
397114ceaa3eeeef4e81845080c1a09c6066f889
-
SHA256
b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1
-
SHA512
07fb9957d04bd359bf4563c6c145f2180a48583163782ff4ff1a4aba9f116fec0796072eab370c3988c5b18de73342929c9947dbd932590e3fcfc78e002a214d
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1976-118-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/1976-120-0x0000000000400000-0x0000000000454000-memory.dmp netwire behavioral1/memory/1068-141-0x0000000076EA0000-0x0000000077020000-memory.dmp netwire behavioral1/memory/1152-162-0x0000000000400000-0x0000000000454000-memory.dmp netwire -
Executes dropped EXE 4 IoCs
Processes:
MSK_OU~1.EXEMSK_OU~1.EXEmsk.exemsk.exepid process 1012 MSK_OU~1.EXE 1976 MSK_OU~1.EXE 1068 msk.exe 1152 msk.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
msk.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{52L32356-50WU-8R83-SE18-64X71T8L55I4} msk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{52L32356-50WU-8R83-SE18-64X71T8L55I4}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\msk.exe\"" msk.exe -
Loads dropped DLL 10 IoCs
Processes:
b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exeMSK_OU~1.EXEMSK_OU~1.EXEmsk.exemsk.exepid process 912 b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe 912 b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe 1012 MSK_OU~1.EXE 1012 MSK_OU~1.EXE 1976 MSK_OU~1.EXE 1976 MSK_OU~1.EXE 1976 MSK_OU~1.EXE 1068 msk.exe 1068 msk.exe 1152 msk.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
msk.exeb36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ msk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoffice = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\msk.exe" msk.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
MSK_OU~1.EXEmsk.exedescription pid process target process PID 1012 set thread context of 1976 1012 MSK_OU~1.EXE MSK_OU~1.EXE PID 1068 set thread context of 1152 1068 msk.exe msk.exe -
Drops file in Windows directory 4 IoCs
Processes:
MSK_OU~1.EXEMSK_OU~1.EXEmsk.exemsk.exedescription ioc process File opened for modification C:\Windows\win.ini MSK_OU~1.EXE File opened for modification C:\Windows\win.ini MSK_OU~1.EXE File opened for modification C:\Windows\win.ini msk.exe File opened for modification C:\Windows\win.ini msk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
MSK_OU~1.EXEMSK_OU~1.EXEmsk.exemsk.exepid process 1012 MSK_OU~1.EXE 1976 MSK_OU~1.EXE 1068 msk.exe 1152 msk.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exeMSK_OU~1.EXEMSK_OU~1.EXEmsk.exedescription pid process target process PID 912 wrote to memory of 1012 912 b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe MSK_OU~1.EXE PID 912 wrote to memory of 1012 912 b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe MSK_OU~1.EXE PID 912 wrote to memory of 1012 912 b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe MSK_OU~1.EXE PID 912 wrote to memory of 1012 912 b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe MSK_OU~1.EXE PID 912 wrote to memory of 1012 912 b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe MSK_OU~1.EXE PID 912 wrote to memory of 1012 912 b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe MSK_OU~1.EXE PID 912 wrote to memory of 1012 912 b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe MSK_OU~1.EXE PID 1012 wrote to memory of 1976 1012 MSK_OU~1.EXE MSK_OU~1.EXE PID 1012 wrote to memory of 1976 1012 MSK_OU~1.EXE MSK_OU~1.EXE PID 1012 wrote to memory of 1976 1012 MSK_OU~1.EXE MSK_OU~1.EXE PID 1012 wrote to memory of 1976 1012 MSK_OU~1.EXE MSK_OU~1.EXE PID 1012 wrote to memory of 1976 1012 MSK_OU~1.EXE MSK_OU~1.EXE PID 1012 wrote to memory of 1976 1012 MSK_OU~1.EXE MSK_OU~1.EXE PID 1012 wrote to memory of 1976 1012 MSK_OU~1.EXE MSK_OU~1.EXE PID 1976 wrote to memory of 1068 1976 MSK_OU~1.EXE msk.exe PID 1976 wrote to memory of 1068 1976 MSK_OU~1.EXE msk.exe PID 1976 wrote to memory of 1068 1976 MSK_OU~1.EXE msk.exe PID 1976 wrote to memory of 1068 1976 MSK_OU~1.EXE msk.exe PID 1976 wrote to memory of 1068 1976 MSK_OU~1.EXE msk.exe PID 1976 wrote to memory of 1068 1976 MSK_OU~1.EXE msk.exe PID 1976 wrote to memory of 1068 1976 MSK_OU~1.EXE msk.exe PID 1068 wrote to memory of 1152 1068 msk.exe msk.exe PID 1068 wrote to memory of 1152 1068 msk.exe msk.exe PID 1068 wrote to memory of 1152 1068 msk.exe msk.exe PID 1068 wrote to memory of 1152 1068 msk.exe msk.exe PID 1068 wrote to memory of 1152 1068 msk.exe msk.exe PID 1068 wrote to memory of 1152 1068 msk.exe msk.exe PID 1068 wrote to memory of 1152 1068 msk.exe msk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe"C:\Users\Admin\AppData\Local\Temp\b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Roaming\Install\msk.exe"C:\Users\Admin\AppData\Roaming\Install\msk.exe" -m "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Roaming\Install\msk.exe"C:\Users\Admin\AppData\Roaming\Install\msk.exe" -m "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE"5⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1152
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272.7MB
MD569ac0d444807b9bde495ef849537700f
SHA169c66862584083c0c120e0e7a27516733460c76d
SHA256a99f0135fff43cc365e9087cfbbabb666e9a5c4a3b897cc1868801b48a1e0d98
SHA5120f6382508a8dfa7abe5ef382e5c5eb3a0e0b20bac955d939c6c2dbf7c19fc8a57cfbb660cee4242e016b0727e6e0a9889ff6760a526e24e4e312e162a01fe2b8
-
Filesize
225.8MB
MD5565c7ab8c20b7445c210e93583357db5
SHA1bb3c5af3badc1094c953f01a919c66ab03b7fa49
SHA256aae249055935134711d5cbade13bed8dfad81b28aa7faee84971f2dac3fe7533
SHA5129f62e3a751a3036520b746e038a0ca6a4d0e939ecfc5a15800f0e4bdbf7e8cd717aae81a9031265577c2fc2f203d6d3de5d67660fa73312777d5eca4e12a205c
-
Filesize
70.7MB
MD58316770840344cf14f2f741ec26aeea7
SHA1fc7519a44a232d7f80ba21402e3ba57c08d25899
SHA25684af6425c00a5713a3b1ec42e8e1eae78b346d04e02338c2e4ff0db85da40688
SHA5128d06359040d3ee0832d15aea9034f1475fa6a9c1ddeb0a2c9a8a5abff4264f285634471b647fb10a6fd8b81a1a79996faf133d0c807deb39891b1c6408216174
-
Filesize
73.2MB
MD52eba1dbe4a98aa611686d085dac009c0
SHA18aa19691502b6e9fe663c0c3a0a074607f9b9704
SHA256c91fa6c0daaf4e1142dbb24fdec7703c0126497820734212c088d78f6a51f580
SHA5129abf801e1642074b2f84e0e2cfe32928281281267196573e7d8d623bdf60a71b3d9f4ed81b45eaad1668727d9f63599adfc219aa2fabc522cec1989a5eeefa57
-
Filesize
72.7MB
MD5051c89e947f5309c043e8b54ef48eb7d
SHA16bdd64031ac0e25f7ee600d30a84b070001237f4
SHA256fa00c040ff1739e78193caa19aa48b70701d062c356bd9ba387524153ceb2872
SHA512980f4e40bd256bbbab23a92c2335f90258b1f6e8b65d68b0d64723e277fa0abbcac973144f034ff54ab6d81b8923d130d335d3789438178c305ff3a6d7c6082d
-
Filesize
39.0MB
MD51841ae990e697d86f71e64160b4b1120
SHA119894d8f913992641563d7344d0a652e45e498fb
SHA256b820de81fa493a8519917e292ce1ee8f5a135889e96a40200352868acd73ce68
SHA512b9968f3b9b3c84aed1a365e15d12c6b43ef4fd2c599f1d6ed939ed04c43c8bf5c6b4096e8fd6a6e9099d52f64eacd13b2602f2e947f29e8440e3add2f342f8fd
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
509B
MD5d2a2412bddba16d60ec63bd9550d933f
SHA1deb3d3bdc9055f0b4909b31d3048446848fae0e1
SHA25679ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a
SHA5128fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31
-
Filesize
239.1MB
MD5e15f4baf7d2d6a3d74be2667c837ce42
SHA151246ed93f78684fdcfa2c238966478bb88687f3
SHA2568828191710a221d4881630f3e8b8c7e910ad72f8173bebbe90958a526d077820
SHA512993dc1855ae2cc5103df9a3a28e2bf902377af7a33266e7a42b98d1222bd6792c5af2a87cf4d3838fe3a641070c7ac92986b2dbde883cda76e0fdf368c856fcc
-
Filesize
271.4MB
MD58cba004c111b24fa2912560a32808701
SHA1b3e46758dfb75342cb24b3d71debf21d46e6a807
SHA2562ddc0ce7c94d0a35e4e139594a0b83d9fce65215cb0efeaabfbd862e435f847f
SHA512dcc89ebc2eeed6d856fdb4544f6e4a46d6900aab2183696361038a37e1cee0e45c1b23487a159aefd963ea8afa3c00f2a4dbe1ee94cc1c4e24d5b13d9a483974
-
Filesize
226.1MB
MD535386d440708edf29bbc19e81230717f
SHA14851e9cb24a5746fa4ca48f26b7b55557ff1317c
SHA25688b28b088030201402fcbf66afd82130c60a383a16a6e0fb4e3fd55c83bbc73d
SHA512cc8947aafdfb58ea6b32f579a136e46b226469052b9ff11f85afb97ab90b5542b39a2b592f9c7e543223809eeacc072063b21d3f238c942f31d432bf4aa8254e
-
Filesize
83.1MB
MD5f07c36749a46fd1f15ed229e7a43ab8e
SHA1e8940974cf2ad381ee56cf8cf64b388463712152
SHA256cbd760ce6f675354f8cb540fc71587f3105263cd23e5e2aa837f87cde4193bbc
SHA5129a4eb4d7469b829b6976f2284d8f20829469fda7eaf023813beca75c26fe6df66a205b8d114efc561174f993d27ad5978d3abcd899c8af0f334369a306fecfa9
-
Filesize
77.1MB
MD5c123b23d678b96f0494f7c48098578fc
SHA145f9429ae1f3d4104f97244797a457aaaa69b5a0
SHA256a4b20f6005876fb46a4356a3795a2cb98150b5c65964ab5aa5a3d1be35ff03ca
SHA512430b7e7a4c171258eb8370adfcf14be0919032be2eee060220a6706198e932cf5e32dd5a93341706510c21db29768dd10f27cadfcc157f4d5868081c3e82b4d8
-
Filesize
73.8MB
MD560b9f7215640602113b1932750d9f109
SHA1956ebe5b978f998b8695b76a285ced266fb7505a
SHA25659a6602a6c8ec5add8f54e874ca01621423c37373f18f71f0b00ff28b53a7f23
SHA5126719082248cb9ca422166a0f8391b01b1dbcd2b3251fcb120cbf4a3992eb91f491548d4675adf4ad040f542d98e7d795cc9c654867982d8eaf9c5c8cb7e83af7
-
Filesize
73.9MB
MD5b29befafb4fa6052a0d8d70ef4912bb9
SHA1cbb4cc41b0c9dc457ee5248db79f2d0835d88216
SHA256069aeacb35bb97beabd0fdff1a0b3c9cc12a0592d465d96e6fbff7d898618585
SHA5125a222b6d53cbde994e88a6ce8f898e3edf05993b6545f45b5b38e2b7342ef684e5422b2004ac9758826ee286977c33cba633aab7b2337db1428967d2a6121daf
-
Filesize
68.2MB
MD5beccdc56bc1c6c68fb4c17bc31d08780
SHA148735a025ccd384430f467f0fbb9c999f5e910ed
SHA2561a4f49e5686cf3798217da08bb2bed978645d0eedd5983c84473036aa6657d9b
SHA51289b52df6f3ccb6f82448e7fede3adc27d12fa28cb657fa9ea7ed68cf9a07b4807d5122a80c8a376dc8ac16e8e467b94e46fc2e8d2ebc6038110c7549ef012a38
-
Filesize
35.8MB
MD50bdf26e54599e170a292c89de5946c37
SHA16159133419f9da11db9effbe709155a0cf240a72
SHA256f5f2146c24afd46f8734e2be903c1ac45c4fc0664a8977af4f42d023bec085b8
SHA5123737aecc8213216b07a92ce9ee994d83e28d54362a34a5a1180743059b462ca1fc19ce6202482e426239dcfb9a7927d63dc85951271dc75ef21aee7ec21c2b5e
-
Filesize
31.7MB
MD5cbfd133d16acfa1e6f24abe9c0115195
SHA11e73da7590714f22e39a4d07db545977cb38f9fc
SHA25648acb73f8a411372bd0ed8a17cace86b7140f8f8d8131e9953a423aa422cb57a
SHA512af3f628ecbb4f7d4c0db25505880fb07afbcf570bc357ea3173f5f654ae91e0b9d518431da11db5104687452dba81b466938fbc0004a6d49b312fe2544c116db