Analysis
-
max time kernel
101s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 17:01
Static task
static1
Behavioral task
behavioral1
Sample
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe
Resource
win10v2004-20220721-en
General
-
Target
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe
-
Size
608KB
-
MD5
278e9e7d40d9950b34bb09fa726a4599
-
SHA1
c5ced3269ec258612738ccb2fc1c73ae60873c68
-
SHA256
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
-
SHA512
cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1
Malware Config
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2044-66-0x0000000000400000-0x0000000000499000-memory.dmp netwire behavioral1/memory/2044-67-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/2044-82-0x0000000000400000-0x0000000000499000-memory.dmp netwire behavioral1/memory/572-93-0x0000000000400000-0x0000000000499000-memory.dmp netwire behavioral1/memory/572-94-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/572-101-0x0000000000400000-0x0000000000499000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1736 Host.exe 572 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exepid process 2044 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe 2044 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.execfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exeHost.exeHost.exepid process 2024 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe 2044 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe 2044 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe 1736 Host.exe 572 Host.exe 572 Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exeHost.exedescription pid process target process PID 2024 set thread context of 2044 2024 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe PID 1736 set thread context of 572 1736 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exeHost.exepid process 2024 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe 1736 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.execfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exeHost.exedescription pid process target process PID 2024 wrote to memory of 2044 2024 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe PID 2024 wrote to memory of 2044 2024 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe PID 2024 wrote to memory of 2044 2024 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe PID 2024 wrote to memory of 2044 2024 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe PID 2044 wrote to memory of 1736 2044 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe Host.exe PID 2044 wrote to memory of 1736 2044 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe Host.exe PID 2044 wrote to memory of 1736 2044 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe Host.exe PID 2044 wrote to memory of 1736 2044 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe Host.exe PID 1736 wrote to memory of 572 1736 Host.exe Host.exe PID 1736 wrote to memory of 572 1736 Host.exe Host.exe PID 1736 wrote to memory of 572 1736 Host.exe Host.exe PID 1736 wrote to memory of 572 1736 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe"C:\Users\Admin\AppData\Local\Temp\cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe"C:\Users\Admin\AppData\Local\Temp\cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608KB
MD5278e9e7d40d9950b34bb09fa726a4599
SHA1c5ced3269ec258612738ccb2fc1c73ae60873c68
SHA256cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
SHA512cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1
-
Filesize
608KB
MD5278e9e7d40d9950b34bb09fa726a4599
SHA1c5ced3269ec258612738ccb2fc1c73ae60873c68
SHA256cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
SHA512cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1
-
Filesize
608KB
MD5278e9e7d40d9950b34bb09fa726a4599
SHA1c5ced3269ec258612738ccb2fc1c73ae60873c68
SHA256cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
SHA512cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1
-
Filesize
608KB
MD5278e9e7d40d9950b34bb09fa726a4599
SHA1c5ced3269ec258612738ccb2fc1c73ae60873c68
SHA256cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
SHA512cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1
-
Filesize
608KB
MD5278e9e7d40d9950b34bb09fa726a4599
SHA1c5ced3269ec258612738ccb2fc1c73ae60873c68
SHA256cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
SHA512cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1