Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2022 17:29

General

  • Target

    b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe

  • Size

    856KB

  • MD5

    cf23e46ba9d3c1c3f3fe501e94c6d39e

  • SHA1

    397114ceaa3eeeef4e81845080c1a09c6066f889

  • SHA256

    b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1

  • SHA512

    07fb9957d04bd359bf4563c6c145f2180a48583163782ff4ff1a4aba9f116fec0796072eab370c3988c5b18de73342929c9947dbd932590e3fcfc78e002a214d

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 4 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Loads dropped DLL 10 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe
    "C:\Users\Admin\AppData\Local\Temp\b36eaf5a8176a868814cc8e962cdfecf2d525cd1f9147060c949f2b44963cfa1.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Users\Admin\AppData\Roaming\Install\msk.exe
          "C:\Users\Admin\AppData\Roaming\Install\msk.exe" -m "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1068
          • C:\Users\Admin\AppData\Roaming\Install\msk.exe
            "C:\Users\Admin\AppData\Roaming\Install\msk.exe" -m "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE"
            5⤵
            • Executes dropped EXE
            • Modifies Installed Components in the registry
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            PID:1152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE

    Filesize

    272.7MB

    MD5

    69ac0d444807b9bde495ef849537700f

    SHA1

    69c66862584083c0c120e0e7a27516733460c76d

    SHA256

    a99f0135fff43cc365e9087cfbbabb666e9a5c4a3b897cc1868801b48a1e0d98

    SHA512

    0f6382508a8dfa7abe5ef382e5c5eb3a0e0b20bac955d939c6c2dbf7c19fc8a57cfbb660cee4242e016b0727e6e0a9889ff6760a526e24e4e312e162a01fe2b8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE

    Filesize

    225.8MB

    MD5

    565c7ab8c20b7445c210e93583357db5

    SHA1

    bb3c5af3badc1094c953f01a919c66ab03b7fa49

    SHA256

    aae249055935134711d5cbade13bed8dfad81b28aa7faee84971f2dac3fe7533

    SHA512

    9f62e3a751a3036520b746e038a0ca6a4d0e939ecfc5a15800f0e4bdbf7e8cd717aae81a9031265577c2fc2f203d6d3de5d67660fa73312777d5eca4e12a205c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE

    Filesize

    70.7MB

    MD5

    8316770840344cf14f2f741ec26aeea7

    SHA1

    fc7519a44a232d7f80ba21402e3ba57c08d25899

    SHA256

    84af6425c00a5713a3b1ec42e8e1eae78b346d04e02338c2e4ff0db85da40688

    SHA512

    8d06359040d3ee0832d15aea9034f1475fa6a9c1ddeb0a2c9a8a5abff4264f285634471b647fb10a6fd8b81a1a79996faf133d0c807deb39891b1c6408216174

  • C:\Users\Admin\AppData\Roaming\Install\msk.exe

    Filesize

    73.2MB

    MD5

    2eba1dbe4a98aa611686d085dac009c0

    SHA1

    8aa19691502b6e9fe663c0c3a0a074607f9b9704

    SHA256

    c91fa6c0daaf4e1142dbb24fdec7703c0126497820734212c088d78f6a51f580

    SHA512

    9abf801e1642074b2f84e0e2cfe32928281281267196573e7d8d623bdf60a71b3d9f4ed81b45eaad1668727d9f63599adfc219aa2fabc522cec1989a5eeefa57

  • C:\Users\Admin\AppData\Roaming\Install\msk.exe

    Filesize

    72.7MB

    MD5

    051c89e947f5309c043e8b54ef48eb7d

    SHA1

    6bdd64031ac0e25f7ee600d30a84b070001237f4

    SHA256

    fa00c040ff1739e78193caa19aa48b70701d062c356bd9ba387524153ceb2872

    SHA512

    980f4e40bd256bbbab23a92c2335f90258b1f6e8b65d68b0d64723e277fa0abbcac973144f034ff54ab6d81b8923d130d335d3789438178c305ff3a6d7c6082d

  • C:\Users\Admin\AppData\Roaming\Install\msk.exe

    Filesize

    39.0MB

    MD5

    1841ae990e697d86f71e64160b4b1120

    SHA1

    19894d8f913992641563d7344d0a652e45e498fb

    SHA256

    b820de81fa493a8519917e292ce1ee8f5a135889e96a40200352868acd73ce68

    SHA512

    b9968f3b9b3c84aed1a365e15d12c6b43ef4fd2c599f1d6ed939ed04c43c8bf5c6b4096e8fd6a6e9099d52f64eacd13b2602f2e947f29e8440e3add2f342f8fd

  • C:\Windows\win.ini

    Filesize

    509B

    MD5

    d2a2412bddba16d60ec63bd9550d933f

    SHA1

    deb3d3bdc9055f0b4909b31d3048446848fae0e1

    SHA256

    79ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a

    SHA512

    8fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31

  • C:\Windows\win.ini

    Filesize

    509B

    MD5

    d2a2412bddba16d60ec63bd9550d933f

    SHA1

    deb3d3bdc9055f0b4909b31d3048446848fae0e1

    SHA256

    79ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a

    SHA512

    8fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31

  • C:\Windows\win.ini

    Filesize

    509B

    MD5

    d2a2412bddba16d60ec63bd9550d933f

    SHA1

    deb3d3bdc9055f0b4909b31d3048446848fae0e1

    SHA256

    79ff2254e38192be1626d05bec6c82e10c85e1cf91df7440c4c443380a1e877a

    SHA512

    8fecada107f72e59e43a689eeb8e2e18fa6134d0941c122025ed5bd00e5eab8114d7125bd289505be75641385a0c3f112d402c693f142c3ddc870d5fa8116e31

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE

    Filesize

    239.1MB

    MD5

    e15f4baf7d2d6a3d74be2667c837ce42

    SHA1

    51246ed93f78684fdcfa2c238966478bb88687f3

    SHA256

    8828191710a221d4881630f3e8b8c7e910ad72f8173bebbe90958a526d077820

    SHA512

    993dc1855ae2cc5103df9a3a28e2bf902377af7a33266e7a42b98d1222bd6792c5af2a87cf4d3838fe3a641070c7ac92986b2dbde883cda76e0fdf368c856fcc

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE

    Filesize

    271.4MB

    MD5

    8cba004c111b24fa2912560a32808701

    SHA1

    b3e46758dfb75342cb24b3d71debf21d46e6a807

    SHA256

    2ddc0ce7c94d0a35e4e139594a0b83d9fce65215cb0efeaabfbd862e435f847f

    SHA512

    dcc89ebc2eeed6d856fdb4544f6e4a46d6900aab2183696361038a37e1cee0e45c1b23487a159aefd963ea8afa3c00f2a4dbe1ee94cc1c4e24d5b13d9a483974

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE

    Filesize

    226.1MB

    MD5

    35386d440708edf29bbc19e81230717f

    SHA1

    4851e9cb24a5746fa4ca48f26b7b55557ff1317c

    SHA256

    88b28b088030201402fcbf66afd82130c60a383a16a6e0fb4e3fd55c83bbc73d

    SHA512

    cc8947aafdfb58ea6b32f579a136e46b226469052b9ff11f85afb97ab90b5542b39a2b592f9c7e543223809eeacc072063b21d3f238c942f31d432bf4aa8254e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE

    Filesize

    83.1MB

    MD5

    f07c36749a46fd1f15ed229e7a43ab8e

    SHA1

    e8940974cf2ad381ee56cf8cf64b388463712152

    SHA256

    cbd760ce6f675354f8cb540fc71587f3105263cd23e5e2aa837f87cde4193bbc

    SHA512

    9a4eb4d7469b829b6976f2284d8f20829469fda7eaf023813beca75c26fe6df66a205b8d114efc561174f993d27ad5978d3abcd899c8af0f334369a306fecfa9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\MSK_OU~1.EXE

    Filesize

    77.1MB

    MD5

    c123b23d678b96f0494f7c48098578fc

    SHA1

    45f9429ae1f3d4104f97244797a457aaaa69b5a0

    SHA256

    a4b20f6005876fb46a4356a3795a2cb98150b5c65964ab5aa5a3d1be35ff03ca

    SHA512

    430b7e7a4c171258eb8370adfcf14be0919032be2eee060220a6706198e932cf5e32dd5a93341706510c21db29768dd10f27cadfcc157f4d5868081c3e82b4d8

  • \Users\Admin\AppData\Roaming\Install\msk.exe

    Filesize

    73.8MB

    MD5

    60b9f7215640602113b1932750d9f109

    SHA1

    956ebe5b978f998b8695b76a285ced266fb7505a

    SHA256

    59a6602a6c8ec5add8f54e874ca01621423c37373f18f71f0b00ff28b53a7f23

    SHA512

    6719082248cb9ca422166a0f8391b01b1dbcd2b3251fcb120cbf4a3992eb91f491548d4675adf4ad040f542d98e7d795cc9c654867982d8eaf9c5c8cb7e83af7

  • \Users\Admin\AppData\Roaming\Install\msk.exe

    Filesize

    73.9MB

    MD5

    b29befafb4fa6052a0d8d70ef4912bb9

    SHA1

    cbb4cc41b0c9dc457ee5248db79f2d0835d88216

    SHA256

    069aeacb35bb97beabd0fdff1a0b3c9cc12a0592d465d96e6fbff7d898618585

    SHA512

    5a222b6d53cbde994e88a6ce8f898e3edf05993b6545f45b5b38e2b7342ef684e5422b2004ac9758826ee286977c33cba633aab7b2337db1428967d2a6121daf

  • \Users\Admin\AppData\Roaming\Install\msk.exe

    Filesize

    68.2MB

    MD5

    beccdc56bc1c6c68fb4c17bc31d08780

    SHA1

    48735a025ccd384430f467f0fbb9c999f5e910ed

    SHA256

    1a4f49e5686cf3798217da08bb2bed978645d0eedd5983c84473036aa6657d9b

    SHA512

    89b52df6f3ccb6f82448e7fede3adc27d12fa28cb657fa9ea7ed68cf9a07b4807d5122a80c8a376dc8ac16e8e467b94e46fc2e8d2ebc6038110c7549ef012a38

  • \Users\Admin\AppData\Roaming\Install\msk.exe

    Filesize

    35.8MB

    MD5

    0bdf26e54599e170a292c89de5946c37

    SHA1

    6159133419f9da11db9effbe709155a0cf240a72

    SHA256

    f5f2146c24afd46f8734e2be903c1ac45c4fc0664a8977af4f42d023bec085b8

    SHA512

    3737aecc8213216b07a92ce9ee994d83e28d54362a34a5a1180743059b462ca1fc19ce6202482e426239dcfb9a7927d63dc85951271dc75ef21aee7ec21c2b5e

  • \Users\Admin\AppData\Roaming\Install\msk.exe

    Filesize

    31.7MB

    MD5

    cbfd133d16acfa1e6f24abe9c0115195

    SHA1

    1e73da7590714f22e39a4d07db545977cb38f9fc

    SHA256

    48acb73f8a411372bd0ed8a17cace86b7140f8f8d8131e9953a423aa422cb57a

    SHA512

    af3f628ecbb4f7d4c0db25505880fb07afbcf570bc357ea3173f5f654ae91e0b9d518431da11db5104687452dba81b466938fbc0004a6d49b312fe2544c116db

  • memory/912-54-0x0000000074DB1000-0x0000000074DB3000-memory.dmp

    Filesize

    8KB

  • memory/1012-80-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-101-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-78-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-77-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-81-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-83-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-84-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-85-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-86-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-87-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-88-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-89-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-91-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-90-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-92-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-93-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-94-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-95-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-96-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-97-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-98-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-99-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-100-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-70-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-102-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-103-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-104-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-105-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-106-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-107-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-108-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-109-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-110-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-111-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-112-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-114-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-74-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-57-0x0000000000000000-mapping.dmp

  • memory/1012-62-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/1012-117-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-75-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-119-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-63-0x0000000000330000-0x000000000033A000-memory.dmp

    Filesize

    40KB

  • memory/1012-66-0x0000000000AF1000-0x0000000000AF5000-memory.dmp

    Filesize

    16KB

  • memory/1012-68-0x0000000076CC0000-0x0000000076E69000-memory.dmp

    Filesize

    1.7MB

  • memory/1012-73-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-69-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1012-71-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-136-0x0000000002850000-0x0000000002960000-memory.dmp

    Filesize

    1.1MB

  • memory/1068-149-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-154-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-152-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-150-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-125-0x0000000000000000-mapping.dmp

  • memory/1068-148-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-147-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-137-0x0000000076CC0000-0x0000000076E69000-memory.dmp

    Filesize

    1.7MB

  • memory/1068-138-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-139-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-140-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-141-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-142-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-143-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1068-145-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/1152-134-0x0000000000000000-mapping.dmp

  • memory/1152-151-0x0000000000210000-0x0000000000216000-memory.dmp

    Filesize

    24KB

  • memory/1152-153-0x0000000000210000-0x000000000021A000-memory.dmp

    Filesize

    40KB

  • memory/1152-162-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1976-116-0x0000000076EB0000-0x0000000076F86000-memory.dmp

    Filesize

    856KB

  • memory/1976-118-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB

  • memory/1976-121-0x0000000003780000-0x00000000038DC000-memory.dmp

    Filesize

    1.4MB

  • memory/1976-65-0x0000000000000000-mapping.dmp

  • memory/1976-120-0x0000000000400000-0x0000000000454000-memory.dmp

    Filesize

    336KB

  • memory/1976-122-0x0000000003780000-0x00000000038DC000-memory.dmp

    Filesize

    1.4MB

  • memory/1976-115-0x0000000076CC0000-0x0000000076E69000-memory.dmp

    Filesize

    1.7MB