Analysis
-
max time kernel
150s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 17:56
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.RATX-gen.6439.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.RATX-gen.6439.exe
Resource
win10v2004-20220901-en
General
-
Target
SecuriteInfo.com.Win32.RATX-gen.6439.exe
-
Size
953KB
-
MD5
705e29680f4f0f0310b4680e05f053d0
-
SHA1
15ab85f450c8fd3e7d25a7889dc658fdfcee9ede
-
SHA256
444eb9da59786055bffa5f9d294fc26edc82a7b31975383efb7f2b9764402cf5
-
SHA512
1290bd274a3b4d426edd46d5597f05d8e056cbae92c5eda29616264cdf28fc6387f282e4188dff740e1aeed86974ffdb22ca70dab0e9e2c7a49ff218d932779e
-
SSDEEP
12288:KFnvWXswpJFQLW3pTLPRVS6IsoDJdrDpvdoxZYg1+kWA/hP1SBh71B:+Wx73ZdmnbAagsA/h9s
Malware Config
Extracted
netwire
podzeye2.duckdns.org:4411
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/468-69-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-71-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-72-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-75-0x000000000041AE7B-mapping.dmp netwire behavioral1/memory/468-74-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-78-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/468-81-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.Win32.RATX-gen.6439.exedescription pid process target process PID 912 set thread context of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
SecuriteInfo.com.Win32.RATX-gen.6439.exepowershell.exepid process 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe 2036 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SecuriteInfo.com.Win32.RATX-gen.6439.exepowershell.exedescription pid process Token: SeDebugPrivilege 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe Token: SeDebugPrivilege 2036 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
SecuriteInfo.com.Win32.RATX-gen.6439.exedescription pid process target process PID 912 wrote to memory of 2036 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe powershell.exe PID 912 wrote to memory of 2036 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe powershell.exe PID 912 wrote to memory of 2036 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe powershell.exe PID 912 wrote to memory of 2036 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe powershell.exe PID 912 wrote to memory of 956 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe schtasks.exe PID 912 wrote to memory of 956 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe schtasks.exe PID 912 wrote to memory of 956 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe schtasks.exe PID 912 wrote to memory of 956 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe schtasks.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe PID 912 wrote to memory of 468 912 SecuriteInfo.com.Win32.RATX-gen.6439.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.6439.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.RATX-gen.6439.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LoLOUy.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LoLOUy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp259B.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp259B.tmpFilesize
1KB
MD535f49252e09dec80798bc548eb073eaa
SHA188c00b84ddcdc3df3b040f3594ca2eaf89427fc8
SHA2561e8f39a5d7e6290adaae14f662b0937cba73567b187504337bee0c13db8afbea
SHA51273fdd2059a6f658a4de40ec9a478c8269caa1c2028aff620c59fa183df682f36d6902719da097eee0a947d4134e13ee6556091f463d2b2a6d2f1c5d75f7d1791
-
memory/468-75-0x000000000041AE7B-mapping.dmp
-
memory/468-67-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/468-74-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/468-72-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/468-64-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/468-71-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/468-69-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/468-78-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/468-81-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/468-65-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/912-63-0x0000000008050000-0x000000000809A000-memory.dmpFilesize
296KB
-
memory/912-55-0x0000000075661000-0x0000000075663000-memory.dmpFilesize
8KB
-
memory/912-56-0x00000000005C0000-0x00000000005D6000-memory.dmpFilesize
88KB
-
memory/912-58-0x0000000007CC0000-0x0000000007D64000-memory.dmpFilesize
656KB
-
memory/912-54-0x0000000000270000-0x0000000000364000-memory.dmpFilesize
976KB
-
memory/912-57-0x0000000001F00000-0x0000000001F0C000-memory.dmpFilesize
48KB
-
memory/956-60-0x0000000000000000-mapping.dmp
-
memory/2036-79-0x000000006F2D0000-0x000000006F87B000-memory.dmpFilesize
5.7MB
-
memory/2036-80-0x000000006F2D0000-0x000000006F87B000-memory.dmpFilesize
5.7MB
-
memory/2036-59-0x0000000000000000-mapping.dmp