Analysis

  • max time kernel
    119s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2022 01:46

General

  • Target

    Payment_pdf.js

  • Size

    411KB

  • MD5

    86ce1b0b23b154994c211e323a0e809f

  • SHA1

    54eac40a919784f9b6321a009c050f8504b4783d

  • SHA256

    89186eaf46c92a3e8db381a239e54a77e214276b8bb0afb17f34c329ad71a495

  • SHA512

    6389e55db118e718a3f605d2abcd718ba870ceca89dfe18e24005d3bf0ac00f632287cadcd0cff0569cade33e7a65a313a6b953d0a64ef32e304bf2e1630080c

Malware Config

Signatures

  • NetWire RAT payload 4 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\Payment_pdf.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\PnzlGrTgWm.js"
      2⤵
        PID:4728
      • C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe
        "C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe
          "C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe"
          3⤵
          • Executes dropped EXE
          • Drops startup file
          • Adds Run key to start application
          PID:2248

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe

      Filesize

      227KB

      MD5

      fc6330d62ae89347dddf9e98d6dc2533

      SHA1

      b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

      SHA256

      72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

      SHA512

      1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

    • C:\Users\Admin\AppData\Roaming\Googlee\Notepad.exe

      Filesize

      227KB

      MD5

      fc6330d62ae89347dddf9e98d6dc2533

      SHA1

      b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

      SHA256

      72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

      SHA512

      1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

    • C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe

      Filesize

      227KB

      MD5

      fc6330d62ae89347dddf9e98d6dc2533

      SHA1

      b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

      SHA256

      72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

      SHA512

      1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

    • C:\Users\Admin\AppData\Roaming\Host Ip Js StartUp.exe

      Filesize

      227KB

      MD5

      fc6330d62ae89347dddf9e98d6dc2533

      SHA1

      b2a3104e8178e25b6b40cf8b19d60c1a4e03e969

      SHA256

      72c15ab989fb449e62d6a560bdad1c9c39d61c21345322b8c1331235adf484a7

      SHA512

      1cf0e356a72a525b585533adab9c2abe1cfef9127ef96fedefe840bf33248bb85752fd92ca447cc6ac2b0654b497c07e3e3d0f0e064958f0f17b3e79424d6a4c

    • C:\Users\Admin\AppData\Roaming\PnzlGrTgWm.js

      Filesize

      1KB

      MD5

      1b76658fbca30c67b79d825d480a2e9c

      SHA1

      1610c73de356adac0d6c7175c88973a00ad35f2a

      SHA256

      75cf22e2317229dcc94257b3d3592d8ae606ab24ad98a51fd4870d2c32fe192f

      SHA512

      6de4916fd374a0f09ca2a0a007801bb40c5e3f5c0bceb3a787468236e4630c14d71b81bc98c577e88a9bde07c5a768563f90e27ead9a305aa7493462fdaf1bb8

    • memory/2248-137-0x0000000000000000-mapping.dmp

    • memory/4728-132-0x0000000000000000-mapping.dmp

    • memory/5008-134-0x0000000000000000-mapping.dmp