Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 00:11
Static task
static1
Behavioral task
behavioral1
Sample
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe
Resource
win10v2004-20220722-en
General
-
Target
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe
-
Size
1.1MB
-
MD5
061dc947f87b44a8e531a4c6038ce9d6
-
SHA1
0892589b478df6ffba31e3d021e2b8c55dd81651
-
SHA256
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328
-
SHA512
1bd471f606bdabf0b3f4af1aca75a22c565cf4043b410433643f7d4a6665af870159beb23428f148a4b27d2c5761f5d415ce533f2af96081d9147196f3314a2b
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3984-137-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral2/memory/3984-139-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral2/memory/3984-140-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral2/memory/3984-141-0x0000000000400000-0x0000000000425000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
xxxxxx.exepid process 4272 xxxxxx.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exexxxxxx.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe Set value (str) \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OKFPNP = "C:\\Users\\Admin\\AppData\\Local\\OKFPNP\\OKFPNPRE.vbs" xxxxxx.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
xxxxxx.exedescription pid process target process PID 4272 set thread context of 3984 4272 xxxxxx.exe TapiUnattend.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
xxxxxx.exepid process 4272 xxxxxx.exe 4272 xxxxxx.exe 4272 xxxxxx.exe 4272 xxxxxx.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exexxxxxx.exedescription pid process target process PID 4964 wrote to memory of 4272 4964 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 4964 wrote to memory of 4272 4964 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 4964 wrote to memory of 4272 4964 9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe xxxxxx.exe PID 4272 wrote to memory of 3984 4272 xxxxxx.exe TapiUnattend.exe PID 4272 wrote to memory of 3984 4272 xxxxxx.exe TapiUnattend.exe PID 4272 wrote to memory of 3984 4272 xxxxxx.exe TapiUnattend.exe PID 4272 wrote to memory of 3984 4272 xxxxxx.exe TapiUnattend.exe PID 4272 wrote to memory of 3984 4272 xxxxxx.exe TapiUnattend.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe"C:\Users\Admin\AppData\Local\Temp\9cab0f61512b3ae9466db036a7a3dfc6b6deaa3756f9ba72fa7095a0c8f82328.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xxxxxx.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\TapiUnattend.exe"C:\Windows\System32\TapiUnattend.exe"3⤵PID:3984
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD529b5bdc4be65fd95d737bb487d3103f1
SHA1b96a29beeecd961767e9abe347a508cd474e2e01
SHA256362175b76e4911263aefa81858b0c3b4e01bf992d7a08b4cb1b160bc6d00db0c
SHA5124070c975db4fff163bf3955776b3f1b00bd5cb7b9451ee0ba299ed1af5f85d9e756dd41c7a7425985543c97f49cb419ece63861597df33de6e7d27ee4f218924
-
Filesize
759KB
MD588cec867d63b7562b7f0dd495c1e2aeb
SHA129c6dfe02530a851109329435b06ab1d14aa916b
SHA25662f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f
SHA51283ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352
-
Filesize
759KB
MD588cec867d63b7562b7f0dd495c1e2aeb
SHA129c6dfe02530a851109329435b06ab1d14aa916b
SHA25662f690c7b1df8004432f31594b0b7e69eb19cbe4c46a8505eeb8e7bd9fa3553f
SHA51283ad97065c3a2f4ca4452c0e7906680455cd46769579bf907d0c8de32bbaf84136081ce6d616ff71ea9caee8171ea6e33211b096e3cd31a50e009f742f4b3352