Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2022 21:40
Static task
static1
Behavioral task
behavioral1
Sample
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe
Resource
win10v2004-20220721-en
General
-
Target
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe
-
Size
484KB
-
MD5
c4dbe777db898a49511307d955c3b4b6
-
SHA1
921564e52c34f41a35a880335b32e50139fa3d78
-
SHA256
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
-
SHA512
75fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba
Malware Config
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2100-137-0x0000000000400000-0x000000000047B000-memory.dmp netwire behavioral2/memory/2100-138-0x0000000000400000-0x0000000000425000-memory.dmp netwire behavioral2/memory/2100-146-0x0000000000400000-0x000000000047B000-memory.dmp netwire behavioral2/memory/2668-168-0x0000000000400000-0x000000000047B000-memory.dmp netwire behavioral2/memory/2668-171-0x0000000000400000-0x000000000047B000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 3200 Host.exe 2668 Host.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{73CA3KJF-WV1I-E458-AS18-0G034V724685} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{73CA3KJF-WV1I-E458-AS18-0G034V724685}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exeHost.exedescription pid process target process PID 4820 set thread context of 2100 4820 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe PID 3200 set thread context of 2668 3200 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exeHost.exepid process 4820 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 3200 Host.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exeHost.exedescription pid process target process PID 4820 wrote to memory of 2100 4820 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe PID 4820 wrote to memory of 2100 4820 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe PID 4820 wrote to memory of 2100 4820 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe PID 2100 wrote to memory of 3200 2100 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe Host.exe PID 2100 wrote to memory of 3200 2100 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe Host.exe PID 2100 wrote to memory of 3200 2100 53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe Host.exe PID 3200 wrote to memory of 2668 3200 Host.exe Host.exe PID 3200 wrote to memory of 2668 3200 Host.exe Host.exe PID 3200 wrote to memory of 2668 3200 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe"C:\Users\Admin\AppData\Local\Temp\53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe"C:\Users\Admin\AppData\Local\Temp\53c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:2668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD5c4dbe777db898a49511307d955c3b4b6
SHA1921564e52c34f41a35a880335b32e50139fa3d78
SHA25653c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
SHA51275fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba
-
Filesize
484KB
MD5c4dbe777db898a49511307d955c3b4b6
SHA1921564e52c34f41a35a880335b32e50139fa3d78
SHA25653c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
SHA51275fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba
-
Filesize
484KB
MD5c4dbe777db898a49511307d955c3b4b6
SHA1921564e52c34f41a35a880335b32e50139fa3d78
SHA25653c2de5f2b0503809ce6eae59bc28e105a90a40a003d33fffcf4c60b1072f823
SHA51275fbd297bfa88ee83fb9d40d8e1a626869791ce5a8f49292d842373dae8b3c9d863f6ab31b93fe1b44ab706188c349538a3e3ce041f3dbc1cc7e79423d61e1ba