Analysis
-
max time kernel
120s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 09:52
Static task
static1
Behavioral task
behavioral1
Sample
8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe
Resource
win10v2004-20220721-en
General
-
Target
8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe
-
Size
652KB
-
MD5
3c12d90906ea1d09effbd01ad9d1722c
-
SHA1
bfe0d9c84344ef859e4f8d69d2d35d535aa31533
-
SHA256
8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8
-
SHA512
cb7be4839fa5863e449cad6b36be94aedfd3c56ab390cf6d14fe6ceecc690578c753e35b080f147df076db12c40bda7c7626e7d157738c57df977e68421b7c2b
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1652-65-0x0000000000400000-0x00000000004A4000-memory.dmp netwire behavioral1/memory/1652-66-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/1652-81-0x0000000000400000-0x00000000004A4000-memory.dmp netwire behavioral1/memory/320-91-0x0000000000400000-0x00000000004A4000-memory.dmp netwire behavioral1/memory/320-92-0x0000000000400000-0x000000000042B000-memory.dmp netwire behavioral1/memory/320-100-0x0000000000400000-0x00000000004A4000-memory.dmp netwire behavioral1/memory/1748-101-0x0000000077C60000-0x0000000077DE0000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1748 Host.exe 320 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exepid process 1652 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 1652 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exeHost.exeHost.exepid process 1144 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 1652 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 1652 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 1748 Host.exe 320 Host.exe 320 Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exeHost.exedescription pid process target process PID 1144 set thread context of 1652 1144 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe PID 1748 set thread context of 320 1748 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exeHost.exepid process 1144 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 1748 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exeHost.exedescription pid process target process PID 1144 wrote to memory of 1652 1144 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe PID 1144 wrote to memory of 1652 1144 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe PID 1144 wrote to memory of 1652 1144 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe PID 1144 wrote to memory of 1652 1144 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe PID 1652 wrote to memory of 1748 1652 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe Host.exe PID 1652 wrote to memory of 1748 1652 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe Host.exe PID 1652 wrote to memory of 1748 1652 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe Host.exe PID 1652 wrote to memory of 1748 1652 8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe Host.exe PID 1748 wrote to memory of 320 1748 Host.exe Host.exe PID 1748 wrote to memory of 320 1748 Host.exe Host.exe PID 1748 wrote to memory of 320 1748 Host.exe Host.exe PID 1748 wrote to memory of 320 1748 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe"C:\Users\Admin\AppData\Local\Temp\8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe"C:\Users\Admin\AppData\Local\Temp\8557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652KB
MD53c12d90906ea1d09effbd01ad9d1722c
SHA1bfe0d9c84344ef859e4f8d69d2d35d535aa31533
SHA2568557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8
SHA512cb7be4839fa5863e449cad6b36be94aedfd3c56ab390cf6d14fe6ceecc690578c753e35b080f147df076db12c40bda7c7626e7d157738c57df977e68421b7c2b
-
Filesize
652KB
MD53c12d90906ea1d09effbd01ad9d1722c
SHA1bfe0d9c84344ef859e4f8d69d2d35d535aa31533
SHA2568557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8
SHA512cb7be4839fa5863e449cad6b36be94aedfd3c56ab390cf6d14fe6ceecc690578c753e35b080f147df076db12c40bda7c7626e7d157738c57df977e68421b7c2b
-
Filesize
652KB
MD53c12d90906ea1d09effbd01ad9d1722c
SHA1bfe0d9c84344ef859e4f8d69d2d35d535aa31533
SHA2568557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8
SHA512cb7be4839fa5863e449cad6b36be94aedfd3c56ab390cf6d14fe6ceecc690578c753e35b080f147df076db12c40bda7c7626e7d157738c57df977e68421b7c2b
-
Filesize
652KB
MD53c12d90906ea1d09effbd01ad9d1722c
SHA1bfe0d9c84344ef859e4f8d69d2d35d535aa31533
SHA2568557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8
SHA512cb7be4839fa5863e449cad6b36be94aedfd3c56ab390cf6d14fe6ceecc690578c753e35b080f147df076db12c40bda7c7626e7d157738c57df977e68421b7c2b
-
Filesize
652KB
MD53c12d90906ea1d09effbd01ad9d1722c
SHA1bfe0d9c84344ef859e4f8d69d2d35d535aa31533
SHA2568557ea6eed8a4987e01950fcb07351be1ab22ca6c861602b2eb9421d17de6ef8
SHA512cb7be4839fa5863e449cad6b36be94aedfd3c56ab390cf6d14fe6ceecc690578c753e35b080f147df076db12c40bda7c7626e7d157738c57df977e68421b7c2b