Analysis
-
max time kernel
136s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 04:55
Static task
static1
Behavioral task
behavioral1
Sample
7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe
Resource
win10v2004-20220721-en
General
-
Target
7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe
-
Size
696KB
-
MD5
c28a5732c77812eddfc367dc058ac025
-
SHA1
3d1302756ebea2c6a372d2f9368b638a83d4c9ef
-
SHA256
7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058
-
SHA512
85823f4d2877cb6ec9320b87236f371012c0929eb0734b7367d0af4a1cf7b5f6a1570b33e34104b7162c5ba4e88a58d42a731ab2fdaae587169abc4a8559a3a2
Malware Config
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1816-68-0x0000000000400000-0x00000000004AE000-memory.dmp netwire behavioral1/memory/1816-69-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1816-83-0x0000000000400000-0x00000000004AE000-memory.dmp netwire behavioral1/memory/1592-95-0x0000000000400000-0x00000000004AE000-memory.dmp netwire behavioral1/memory/1592-96-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1592-103-0x0000000000400000-0x00000000004AE000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1524 Host.exe 1592 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exepid process 1816 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 1816 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exeHost.exeHost.exepid process 1392 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 1816 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 1816 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 1524 Host.exe 1592 Host.exe 1592 Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exeHost.exedescription pid process target process PID 1392 set thread context of 1816 1392 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe PID 1524 set thread context of 1592 1524 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exeHost.exepid process 1392 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 1524 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exeHost.exedescription pid process target process PID 1392 wrote to memory of 1816 1392 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe PID 1392 wrote to memory of 1816 1392 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe PID 1392 wrote to memory of 1816 1392 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe PID 1392 wrote to memory of 1816 1392 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe PID 1816 wrote to memory of 1524 1816 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe Host.exe PID 1816 wrote to memory of 1524 1816 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe Host.exe PID 1816 wrote to memory of 1524 1816 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe Host.exe PID 1816 wrote to memory of 1524 1816 7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe Host.exe PID 1524 wrote to memory of 1592 1524 Host.exe Host.exe PID 1524 wrote to memory of 1592 1524 Host.exe Host.exe PID 1524 wrote to memory of 1592 1524 Host.exe Host.exe PID 1524 wrote to memory of 1592 1524 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe"C:\Users\Admin\AppData\Local\Temp\7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe"C:\Users\Admin\AppData\Local\Temp\7056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5c28a5732c77812eddfc367dc058ac025
SHA13d1302756ebea2c6a372d2f9368b638a83d4c9ef
SHA2567056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058
SHA51285823f4d2877cb6ec9320b87236f371012c0929eb0734b7367d0af4a1cf7b5f6a1570b33e34104b7162c5ba4e88a58d42a731ab2fdaae587169abc4a8559a3a2
-
Filesize
696KB
MD5c28a5732c77812eddfc367dc058ac025
SHA13d1302756ebea2c6a372d2f9368b638a83d4c9ef
SHA2567056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058
SHA51285823f4d2877cb6ec9320b87236f371012c0929eb0734b7367d0af4a1cf7b5f6a1570b33e34104b7162c5ba4e88a58d42a731ab2fdaae587169abc4a8559a3a2
-
Filesize
696KB
MD5c28a5732c77812eddfc367dc058ac025
SHA13d1302756ebea2c6a372d2f9368b638a83d4c9ef
SHA2567056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058
SHA51285823f4d2877cb6ec9320b87236f371012c0929eb0734b7367d0af4a1cf7b5f6a1570b33e34104b7162c5ba4e88a58d42a731ab2fdaae587169abc4a8559a3a2
-
Filesize
696KB
MD5c28a5732c77812eddfc367dc058ac025
SHA13d1302756ebea2c6a372d2f9368b638a83d4c9ef
SHA2567056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058
SHA51285823f4d2877cb6ec9320b87236f371012c0929eb0734b7367d0af4a1cf7b5f6a1570b33e34104b7162c5ba4e88a58d42a731ab2fdaae587169abc4a8559a3a2
-
Filesize
696KB
MD5c28a5732c77812eddfc367dc058ac025
SHA13d1302756ebea2c6a372d2f9368b638a83d4c9ef
SHA2567056199cb966a7dfff3cf82ee196d197616a32f9b877b98dabd0001cfd595058
SHA51285823f4d2877cb6ec9320b87236f371012c0929eb0734b7367d0af4a1cf7b5f6a1570b33e34104b7162c5ba4e88a58d42a731ab2fdaae587169abc4a8559a3a2