Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 00:11
Static task
static1
Behavioral task
behavioral1
Sample
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe
Resource
win10v2004-20220722-en
General
-
Target
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe
-
Size
1.1MB
-
MD5
061dc947f87b44a8e531a4c6038ce9d6
-
SHA1
0892589b478df6ffba31e3d021e2b8c55dd81651
-
SHA256
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328
-
SHA512
1bd471f606bdabf0b3f4af1aca75a22c565cf4043b410433643f7d4a6665af870159beb23428f148a4b27d2c5761f5d415ce533f2af96081d9147196f3314a2b
Malware Config
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1728-65-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/1728-66-0x0000000000402570-mapping.dmp netwire behavioral1/memory/1728-69-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/1728-71-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/1728-72-0x0000000000400000-0x0000000000425000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
xxxxxx.exepid process 1920 xxxxxx.exe -
Loads dropped DLL 3 IoCs
Processes:
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exexxxxxx.exepid process 2032 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe 2032 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe 1920 xxxxxx.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exexxxxxx.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\OKFPNP = "C:\\Users\\Admin\\AppData\\Local\\OKFPNP\\OKFPNPRE.vbs" xxxxxx.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
xxxxxx.exedescription pid process target process PID 1920 set thread context of 1728 1920 xxxxxx.exe TapiUnattend.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
xxxxxx.exepid process 1920 xxxxxx.exe 1920 xxxxxx.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exexxxxxx.exedescription pid process target process PID 2032 wrote to memory of 1920 2032 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 2032 wrote to memory of 1920 2032 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 2032 wrote to memory of 1920 2032 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 2032 wrote to memory of 1920 2032 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 2032 wrote to memory of 1920 2032 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 2032 wrote to memory of 1920 2032 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 2032 wrote to memory of 1920 2032 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 1920 wrote to memory of 1728 1920 xxxxxx.exe TapiUnattend.exe PID 1920 wrote to memory of 1728 1920 xxxxxx.exe TapiUnattend.exe PID 1920 wrote to memory of 1728 1920 xxxxxx.exe TapiUnattend.exe PID 1920 wrote to memory of 1728 1920 xxxxxx.exe TapiUnattend.exe PID 1920 wrote to memory of 1728 1920 xxxxxx.exe TapiUnattend.exe PID 1920 wrote to memory of 1728 1920 xxxxxx.exe TapiUnattend.exe PID 1920 wrote to memory of 1728 1920 xxxxxx.exe TapiUnattend.exe PID 1920 wrote to memory of 1728 1920 xxxxxx.exe TapiUnattend.exe PID 1920 wrote to memory of 1728 1920 xxxxxx.exe TapiUnattend.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe"C:\Users\Admin\AppData\Local\Temp\9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\TapiUnattend.exe"C:\Windows\System32\TapiUnattend.exe"3⤵PID:1728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD529b5bdc4be65fd95d737bb487d3103f1
SHA1b96a29beeecd961767e9abe347a508cd474e2e01
SHA256362175b76e4911263aefa81858b0c3b4e01bf992d7a08b4cb1b160bc6d00db0c
SHA5124070c975db4fff163bf3955776b3f1b00bd5cb7b9451ee0ba299ed1af5f85d9e756dd41c7a7425985543c97f49cb419ece63861597df33de6e7d27ee4f218924
-
Filesize
759KB
MD588cec867d63b7562b7f0dd495c1e2aeb
SHA129c6dfe02530a851109329435b06ab1d14aa916b
SHA25662f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f
SHA51283ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352
-
Filesize
759KB
MD588cec867d63b7562b7f0dd495c1e2aeb
SHA129c6dfe02530a851109329435b06ab1d14aa916b
SHA25662f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f
SHA51283ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352
-
Filesize
759KB
MD588cec867d63b7562b7f0dd495c1e2aeb
SHA129c6dfe02530a851109329435b06ab1d14aa916b
SHA25662f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f
SHA51283ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352
-
Filesize
759KB
MD588cec867d63b7562b7f0dd495c1e2aeb
SHA129c6dfe02530a851109329435b06ab1d14aa916b
SHA25662f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f
SHA51283ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352
-
Filesize
759KB
MD588cec867d63b7562b7f0dd495c1e2aeb
SHA129c6dfe02530a851109329435b06ab1d14aa916b
SHA25662f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f
SHA51283ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352