Analysis
-
max time kernel
96s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 17:01
Static task
static1
Behavioral task
behavioral1
Sample
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe
Resource
win10v2004-20220721-en
General
-
Target
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe
-
Size
608KB
-
MD5
278e9e7d40d9950b34bb09fa726a4599
-
SHA1
c5ced3269ec258612738ccb2fc1c73ae60873c68
-
SHA256
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
-
SHA512
cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2296-137-0x0000000000400000-0x0000000000499000-memory.dmp netwire behavioral2/memory/2296-138-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral2/memory/2296-146-0x0000000000400000-0x0000000000499000-memory.dmp netwire behavioral2/memory/3112-170-0x0000000000400000-0x0000000000499000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 4180 Host.exe 3112 Host.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.execfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exeHost.exeHost.exepid process 4708 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe 2296 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe 2296 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe 4180 Host.exe 3112 Host.exe 3112 Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exeHost.exedescription pid process target process PID 4708 set thread context of 2296 4708 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe PID 4180 set thread context of 3112 4180 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exeHost.exepid process 4708 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe 4180 Host.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.execfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exeHost.exedescription pid process target process PID 4708 wrote to memory of 2296 4708 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe PID 4708 wrote to memory of 2296 4708 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe PID 4708 wrote to memory of 2296 4708 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe PID 2296 wrote to memory of 4180 2296 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe Host.exe PID 2296 wrote to memory of 4180 2296 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe Host.exe PID 2296 wrote to memory of 4180 2296 cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe Host.exe PID 4180 wrote to memory of 3112 4180 Host.exe Host.exe PID 4180 wrote to memory of 3112 4180 Host.exe Host.exe PID 4180 wrote to memory of 3112 4180 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe"C:\Users\Admin\AppData\Local\Temp\cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe"C:\Users\Admin\AppData\Local\Temp\cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab.exe"2⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608KB
MD5278e9e7d40d9950b34bb09fa726a4599
SHA1c5ced3269ec258612738ccb2fc1c73ae60873c68
SHA256cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
SHA512cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1
-
Filesize
608KB
MD5278e9e7d40d9950b34bb09fa726a4599
SHA1c5ced3269ec258612738ccb2fc1c73ae60873c68
SHA256cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
SHA512cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1
-
Filesize
608KB
MD5278e9e7d40d9950b34bb09fa726a4599
SHA1c5ced3269ec258612738ccb2fc1c73ae60873c68
SHA256cfe50307ac8ba1860504b4bdea4bc47c67c1873539f786b8453e6e8b7cabe5ab
SHA512cfeecfa90ee26c4c21f384eaa195f4f9d2ba6d2fda853b154c5de86802232b8b04b75e1e9dd20c7724ec5e7f8a891a2284eeff8c5d3559b78a7f62ef322a89b1