Analysis
-
max time kernel
90s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2022 08:52
Static task
static1
Behavioral task
behavioral1
Sample
Confidential.exe
Resource
win7-20220812-en
General
-
Target
Confidential.exe
-
Size
727KB
-
MD5
77d64026e7224a2243bcb023766111e6
-
SHA1
0124b3fc954340b6857c96b37e89e9eca64da43a
-
SHA256
b002c64f7d0ff0a952b72f31609e683f17bb23313417f6639afdec47d9187b25
-
SHA512
aa233f2db25af667574de2de6870cd6aa259b62700f604bf0478dac442a358a143853c8b8ad0c913f91b3b3e05662a3c9a7216cd1ca051fd0c20e5fbba40a0b8
-
SSDEEP
12288:voxpAdRDmK6S8IB++Ll22jqZEp5E3qjJ5nl0+9MK:Z56SRB++LVMy1jrZe
Malware Config
Extracted
netwire
104.222.188.99:3360
zonedx.ddns.net:3360
zonedx.ddns.net:3363
104.222.188.99:3363
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password9090
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/32-142-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/32-144-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/32-145-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
Confidential.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Confidential.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
Confidential.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Confidential.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Confidential.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Confidential.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Confidential.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Confidential.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation Confidential.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Confidential.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Confidential.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Confidential.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Confidential.exedescription pid process target process PID 3424 set thread context of 32 3424 Confidential.exe Confidential.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Confidential.exepid process 3424 Confidential.exe 3424 Confidential.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Confidential.exedescription pid process Token: SeDebugPrivilege 3424 Confidential.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
Confidential.exedescription pid process target process PID 3424 wrote to memory of 3656 3424 Confidential.exe schtasks.exe PID 3424 wrote to memory of 3656 3424 Confidential.exe schtasks.exe PID 3424 wrote to memory of 3656 3424 Confidential.exe schtasks.exe PID 3424 wrote to memory of 240 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 240 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 240 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe PID 3424 wrote to memory of 32 3424 Confidential.exe Confidential.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Confidential.exe"C:\Users\Admin\AppData\Local\Temp\Confidential.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HQbzNKKSw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD4F8.tmp"2⤵
- Creates scheduled task(s)
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\Confidential.exe"{path}"2⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\Confidential.exe"{path}"2⤵PID:32
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD550d02e6d46e912ce8ae6a5ed3e6b0cfb
SHA15b41d4a86b358e055b15e36c5b3060e2e02afc7a
SHA256355f4c6f8c11b4ba0f2b6e482536151e2f946b110f6aa47d6eac21a43e3af3ff
SHA512b11a1bae7ec3ad5769d71c4216f3c4e6b638d6df0c9fe34451980bd1855f5b6644a214909d24e3dc696c2eb4de7b3caa3e0a60b6cfc2f79f7f07a50aaf8d90ad