Analysis
-
max time kernel
142s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 19:43
Static task
static1
Behavioral task
behavioral1
Sample
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe
Resource
win7-20220718-en
General
-
Target
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe
-
Size
196KB
-
MD5
40af2d46b77bcdc84924c5b6a29bfe2d
-
SHA1
8ff1371ddd1fc3839c06d4cc1f86166873a6c726
-
SHA256
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
-
SHA512
860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46
Malware Config
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4684-133-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/4684-135-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/4684-139-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 832 Host.exe -
Drops startup file 1 IoCs
Processes:
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nlomdNielECE.lnk 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exedescription pid process target process PID 4064 set thread context of 4684 4064 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exedescription pid process target process PID 4064 wrote to memory of 4684 4064 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 4064 wrote to memory of 4684 4064 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 4064 wrote to memory of 4684 4064 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 4064 wrote to memory of 4684 4064 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 4064 wrote to memory of 4684 4064 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 4064 wrote to memory of 4684 4064 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 4064 wrote to memory of 4684 4064 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 4064 wrote to memory of 4684 4064 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe PID 4684 wrote to memory of 832 4684 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe Host.exe PID 4684 wrote to memory of 832 4684 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe Host.exe PID 4684 wrote to memory of 832 4684 57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"C:\Users\Admin\AppData\Local\Temp\57d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
PID:832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD540af2d46b77bcdc84924c5b6a29bfe2d
SHA18ff1371ddd1fc3839c06d4cc1f86166873a6c726
SHA25657d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
SHA512860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46
-
Filesize
196KB
MD540af2d46b77bcdc84924c5b6a29bfe2d
SHA18ff1371ddd1fc3839c06d4cc1f86166873a6c726
SHA25657d59bcc4a2ed648b5321f0f68b6b0782642fe66fa8472e6a95dd59db34f3201
SHA512860949ffc6fab641a6666c603919fdd404436048af7e90bce7566dca6abcba213a9e7f92278621b01058bcb233abeb955f86d2c505c1178738c86bda046d6e46