Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-09-2022 15:16
Static task
static1
Behavioral task
behavioral1
Sample
Proof of payment.exe
Resource
win7-20220812-en
General
-
Target
Proof of payment.exe
-
Size
796KB
-
MD5
4f1dde6a0e85ec1f25111ff2e89dd9b8
-
SHA1
1500830e31d710531398faec93e0d72ce5ff3f22
-
SHA256
87ce6467d71023d696315cd06d578f2a17218012beba5502744779614fc67f08
-
SHA512
1eaf18e562b52d293eed3ed0c61d9a077c3d8b12a08c86f8bf44a3d93b5d34fa515db5cbd3b9d22e7015c7279bf6573cbd7e0fb17987cee4b560955931b5949b
-
SSDEEP
12288:hJp7/xpfrKI9Ne/flL3MICFcG52Kh2mIDQfdADqjJ5n:9vfr1kN3NCWGT6Qljr
Malware Config
Extracted
netwire
37.0.14.214:3346
37.0.14.214:4478
37.0.14.214:3469
37.0.14.214:3565
37.0.14.214:3360
37.0.14.214:5589
37.0.14.214:6425
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
move4ward
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 12 IoCs
Processes:
resource yara_rule behavioral1/memory/1720-66-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1720-67-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1720-70-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1720-68-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1720-71-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1720-72-0x000000000040242D-mapping.dmp netwire behavioral1/memory/1720-75-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1720-79-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1472-96-0x000000000040242D-mapping.dmp netwire behavioral1/memory/1472-100-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1472-101-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral1/memory/1472-102-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
Processes:
Proof of payment.exeHost.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Proof of payment.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions Host.exe -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 816 Host.exe 1472 Host.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
Processes:
Proof of payment.exeHost.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Proof of payment.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools Host.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Proof of payment.exeHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Proof of payment.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Proof of payment.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Host.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Host.exe -
Loads dropped DLL 1 IoCs
Processes:
Proof of payment.exepid process 1720 Proof of payment.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Proof of payment.exeHost.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Proof of payment.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Proof of payment.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Host.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Proof of payment.exeHost.exedescription pid process target process PID 364 set thread context of 1720 364 Proof of payment.exe Proof of payment.exe PID 816 set thread context of 1472 816 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1132 schtasks.exe 1976 schtasks.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
Proof of payment.exeProof of payment.exeHost.exedescription pid process target process PID 364 wrote to memory of 1132 364 Proof of payment.exe schtasks.exe PID 364 wrote to memory of 1132 364 Proof of payment.exe schtasks.exe PID 364 wrote to memory of 1132 364 Proof of payment.exe schtasks.exe PID 364 wrote to memory of 1132 364 Proof of payment.exe schtasks.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 364 wrote to memory of 1720 364 Proof of payment.exe Proof of payment.exe PID 1720 wrote to memory of 816 1720 Proof of payment.exe Host.exe PID 1720 wrote to memory of 816 1720 Proof of payment.exe Host.exe PID 1720 wrote to memory of 816 1720 Proof of payment.exe Host.exe PID 1720 wrote to memory of 816 1720 Proof of payment.exe Host.exe PID 816 wrote to memory of 1976 816 Host.exe schtasks.exe PID 816 wrote to memory of 1976 816 Host.exe schtasks.exe PID 816 wrote to memory of 1976 816 Host.exe schtasks.exe PID 816 wrote to memory of 1976 816 Host.exe schtasks.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe PID 816 wrote to memory of 1472 816 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proof of payment.exe"C:\Users\Admin\AppData\Local\Temp\Proof of payment.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WxAKJsr" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEFAD.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Proof of payment.exe"{path}"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WxAKJsr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5E76.tmp"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"{path}"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5E76.tmpFilesize
1KB
MD567bdf26cb3b2c119717618d36d8b1712
SHA12d4e70c21391bb909dea0177537be95cca06ffb0
SHA256af9f9530c8143cfe13c169dcb83364b4b6e5895469550e9f2809efebb2163602
SHA512e11ec6b72a449d965d9cc61e5c88239e949b16c88d421903a6c053f89480da5d7b08df7e4052db7fee5d87a68721c0612e26f9cd3697202e498b842cab76d0a1
-
C:\Users\Admin\AppData\Local\Temp\tmpEFAD.tmpFilesize
1KB
MD567bdf26cb3b2c119717618d36d8b1712
SHA12d4e70c21391bb909dea0177537be95cca06ffb0
SHA256af9f9530c8143cfe13c169dcb83364b4b6e5895469550e9f2809efebb2163602
SHA512e11ec6b72a449d965d9cc61e5c88239e949b16c88d421903a6c053f89480da5d7b08df7e4052db7fee5d87a68721c0612e26f9cd3697202e498b842cab76d0a1
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
796KB
MD54f1dde6a0e85ec1f25111ff2e89dd9b8
SHA11500830e31d710531398faec93e0d72ce5ff3f22
SHA25687ce6467d71023d696315cd06d578f2a17218012beba5502744779614fc67f08
SHA5121eaf18e562b52d293eed3ed0c61d9a077c3d8b12a08c86f8bf44a3d93b5d34fa515db5cbd3b9d22e7015c7279bf6573cbd7e0fb17987cee4b560955931b5949b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
796KB
MD54f1dde6a0e85ec1f25111ff2e89dd9b8
SHA11500830e31d710531398faec93e0d72ce5ff3f22
SHA25687ce6467d71023d696315cd06d578f2a17218012beba5502744779614fc67f08
SHA5121eaf18e562b52d293eed3ed0c61d9a077c3d8b12a08c86f8bf44a3d93b5d34fa515db5cbd3b9d22e7015c7279bf6573cbd7e0fb17987cee4b560955931b5949b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
796KB
MD54f1dde6a0e85ec1f25111ff2e89dd9b8
SHA11500830e31d710531398faec93e0d72ce5ff3f22
SHA25687ce6467d71023d696315cd06d578f2a17218012beba5502744779614fc67f08
SHA5121eaf18e562b52d293eed3ed0c61d9a077c3d8b12a08c86f8bf44a3d93b5d34fa515db5cbd3b9d22e7015c7279bf6573cbd7e0fb17987cee4b560955931b5949b
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
796KB
MD54f1dde6a0e85ec1f25111ff2e89dd9b8
SHA11500830e31d710531398faec93e0d72ce5ff3f22
SHA25687ce6467d71023d696315cd06d578f2a17218012beba5502744779614fc67f08
SHA5121eaf18e562b52d293eed3ed0c61d9a077c3d8b12a08c86f8bf44a3d93b5d34fa515db5cbd3b9d22e7015c7279bf6573cbd7e0fb17987cee4b560955931b5949b
-
memory/364-54-0x00000000011A0000-0x000000000126E000-memory.dmpFilesize
824KB
-
memory/364-58-0x0000000000DC0000-0x0000000000DEE000-memory.dmpFilesize
184KB
-
memory/364-57-0x00000000051F0000-0x000000000526E000-memory.dmpFilesize
504KB
-
memory/364-56-0x00000000003C0000-0x00000000003E0000-memory.dmpFilesize
128KB
-
memory/364-55-0x0000000076681000-0x0000000076683000-memory.dmpFilesize
8KB
-
memory/816-77-0x0000000000000000-mapping.dmp
-
memory/816-81-0x0000000000A70000-0x0000000000B3E000-memory.dmpFilesize
824KB
-
memory/1132-59-0x0000000000000000-mapping.dmp
-
memory/1472-102-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1472-96-0x000000000040242D-mapping.dmp
-
memory/1472-100-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1472-101-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-61-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-79-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-75-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-72-0x000000000040242D-mapping.dmp
-
memory/1720-71-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-68-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-70-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-64-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-67-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-66-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1720-62-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/1976-83-0x0000000000000000-mapping.dmp