Analysis
-
max time kernel
100s -
max time network
104s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
26-07-2022 21:40
Static task
static1
Behavioral task
behavioral1
Sample
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe
Resource
win10v2004-20220721-en
General
-
Target
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe
-
Size
484KB
-
MD5
c4dbe777db898a49511307d955c3b4b6
-
SHA1
921564e52c34f41a35a880335b32e50139fa3d78
-
SHA256
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
-
SHA512
75fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/900-64-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/900-63-0x0000000000400000-0x000000000047B000-memory.dmp netwire behavioral1/memory/900-79-0x0000000000400000-0x000000000047B000-memory.dmp netwire behavioral1/memory/2028-88-0x0000000000400000-0x000000000047B000-memory.dmp netwire behavioral1/memory/2028-89-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral1/memory/2028-97-0x0000000000400000-0x000000000047B000-memory.dmp netwire behavioral1/memory/2028-99-0x0000000000400000-0x000000000047B000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 276 Host.exe 2028 Host.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{73CA3KJF-WV1I-E458-AS18-0G034V724685} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{73CA3KJF-WV1I-E458-AS18-0G034V724685}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Loads dropped DLL 2 IoCs
Processes:
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exepid process 900 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 900 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe Key created \REGISTRY\USER\S-1-5-21-3440072777-2118400376-1759599358-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exeHost.exedescription pid process target process PID 1448 set thread context of 900 1448 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe PID 276 set thread context of 2028 276 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exeHost.exepid process 1448 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 276 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exeHost.exedescription pid process target process PID 1448 wrote to memory of 900 1448 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe PID 1448 wrote to memory of 900 1448 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe PID 1448 wrote to memory of 900 1448 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe PID 1448 wrote to memory of 900 1448 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe PID 900 wrote to memory of 276 900 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe Host.exe PID 900 wrote to memory of 276 900 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe Host.exe PID 900 wrote to memory of 276 900 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe Host.exe PID 900 wrote to memory of 276 900 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe Host.exe PID 276 wrote to memory of 2028 276 Host.exe Host.exe PID 276 wrote to memory of 2028 276 Host.exe Host.exe PID 276 wrote to memory of 2028 276 Host.exe Host.exe PID 276 wrote to memory of 2028 276 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe"C:\Users\Admin\AppData\Local\Temp\53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe"C:\Users\Admin\AppData\Local\Temp\53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:2028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5c4dbe777db898a49511307d955c3b4b6
SHA1921564e52c34f41a35a880335b32e50139fa3d78
SHA25653c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
SHA51275fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba
-
Filesize
484KB
MD5c4dbe777db898a49511307d955c3b4b6
SHA1921564e52c34f41a35a880335b32e50139fa3d78
SHA25653c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
SHA51275fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba
-
Filesize
484KB
MD5c4dbe777db898a49511307d955c3b4b6
SHA1921564e52c34f41a35a880335b32e50139fa3d78
SHA25653c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
SHA51275fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba
-
Filesize
484KB
MD5c4dbe777db898a49511307d955c3b4b6
SHA1921564e52c34f41a35a880335b32e50139fa3d78
SHA25653c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
SHA51275fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba
-
Filesize
484KB
MD5c4dbe777db898a49511307d955c3b4b6
SHA1921564e52c34f41a35a880335b32e50139fa3d78
SHA25653c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
SHA51275fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba