Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 18:59
Static task
static1
Behavioral task
behavioral1
Sample
bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe
Resource
win10v2004-20220812-en
General
-
Target
bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe
-
Size
183KB
-
MD5
7600056accafb4281250bfed98f0630d
-
SHA1
f61bd219039db28797f8ad62674b029442b7f889
-
SHA256
bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181
-
SHA512
2949a540608b904d909cb8e4a873c3322dbab9a34dbb442c149f05da591ba54b7f2af50620d817560b110b9d1ebd9a6e772a9c70408903cf8e8ade3d35a4cdf0
-
SSDEEP
3072:bAsj8MBX8s0oXJT45CcDj9XLYjqwYPTIbLGAw5d8LEUYWNHQ+k0m8hPf8kO/92:bAsBZJ1Up78YrImAwQLFZ6+k0m81fv
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3880-135-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3880-137-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3880-140-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/4348-155-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Ctfmon.exeCtfmon.exepid process 4264 Ctfmon.exe 4348 Ctfmon.exe -
Loads dropped DLL 4 IoCs
Processes:
bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exeCtfmon.exepid process 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe 4264 Ctfmon.exe 4264 Ctfmon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Ctfmon.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Ctfmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ctfmon = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\System32\\Ctfmon.exe" Ctfmon.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exeCtfmon.exedescription pid process target process PID 2100 set thread context of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 4264 set thread context of 4348 4264 Ctfmon.exe Ctfmon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe nsis_installer_2 -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exebd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exeCtfmon.exedescription pid process target process PID 2100 wrote to memory of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 2100 wrote to memory of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 2100 wrote to memory of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 2100 wrote to memory of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 2100 wrote to memory of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 2100 wrote to memory of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 2100 wrote to memory of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 2100 wrote to memory of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 2100 wrote to memory of 3880 2100 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe PID 3880 wrote to memory of 4264 3880 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe Ctfmon.exe PID 3880 wrote to memory of 4264 3880 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe Ctfmon.exe PID 3880 wrote to memory of 4264 3880 bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe Ctfmon.exe PID 4264 wrote to memory of 4348 4264 Ctfmon.exe Ctfmon.exe PID 4264 wrote to memory of 4348 4264 Ctfmon.exe Ctfmon.exe PID 4264 wrote to memory of 4348 4264 Ctfmon.exe Ctfmon.exe PID 4264 wrote to memory of 4348 4264 Ctfmon.exe Ctfmon.exe PID 4264 wrote to memory of 4348 4264 Ctfmon.exe Ctfmon.exe PID 4264 wrote to memory of 4348 4264 Ctfmon.exe Ctfmon.exe PID 4264 wrote to memory of 4348 4264 Ctfmon.exe Ctfmon.exe PID 4264 wrote to memory of 4348 4264 Ctfmon.exe Ctfmon.exe PID 4264 wrote to memory of 4348 4264 Ctfmon.exe Ctfmon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe"C:\Users\Admin\AppData\Local\Temp\bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe"C:\Users\Admin\AppData\Local\Temp\bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\System32\Ctfmon.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5c6c90363290469c10c1139a1360659f0
SHA1c54ebd2d9347099253d37db35d8cf2a10172b697
SHA256b64fa23e5a4fe0f96f8083ddb658e6dc6a5288721dd93765f0c03bebbcb3baf5
SHA51260638dc657655cec337dc7a90446e873b96513b602871914a3fa44cee0c00c8fd4bd6e9988c999450dc9eb4fb3f45663e88ccb4c5dd5402883d233c1f5bcd2bd
-
Filesize
3KB
MD5a0d1600d798ace6dd4103104dd7c80ef
SHA129491c40fe407ac5047ee0a0e589166b523fd7e7
SHA256eb22e5d73a4f915df1e51bb64b604322d60f201d7e89e3dc58032e0734f975a1
SHA512c946fe7c5bd8430e7e68e426b4a3edceace4fea6e99a93c5734a6660d350fc04f07c25966b096ee8677548829f45c36d36556a80ddc6e903b9076b555e19c9f6
-
Filesize
84KB
MD52e0fd06de54f7bacfafd8a4e82129d0e
SHA15dec6be5eb5aa4461f64dcfea5bd4cd1c6722ab7
SHA256686dcc853941b2aa64fa5711fea6a200aaa7be3e801819a415454332ab73b6bc
SHA512eade5e220ffe1623e3a43b663b61330268f286610de9563ddb22b121bfbe8e0767a5392e31f480c4632e36eeac49c720d02063b263aceef5663d800fe9648175
-
Filesize
185KB
MD524f301e43e381bef32d5212094935705
SHA12a097039a799510e01a296101827b964b1dbc4d9
SHA2564497a8ce2c9aad7b6b0078e526f0e799d6bc225f6e7efa6244efa65cce070c72
SHA51295e6f0658e45c8f670df22c156b715186abee8423f5097461bac18863fda7468b26aedfd3b9918380bd24715402234db40cabd6ded2c6bfbe4eb2148a8fb0db6
-
Filesize
185KB
MD524f301e43e381bef32d5212094935705
SHA12a097039a799510e01a296101827b964b1dbc4d9
SHA2564497a8ce2c9aad7b6b0078e526f0e799d6bc225f6e7efa6244efa65cce070c72
SHA51295e6f0658e45c8f670df22c156b715186abee8423f5097461bac18863fda7468b26aedfd3b9918380bd24715402234db40cabd6ded2c6bfbe4eb2148a8fb0db6
-
Filesize
185KB
MD524f301e43e381bef32d5212094935705
SHA12a097039a799510e01a296101827b964b1dbc4d9
SHA2564497a8ce2c9aad7b6b0078e526f0e799d6bc225f6e7efa6244efa65cce070c72
SHA51295e6f0658e45c8f670df22c156b715186abee8423f5097461bac18863fda7468b26aedfd3b9918380bd24715402234db40cabd6ded2c6bfbe4eb2148a8fb0db6
-
Filesize
476B
MD566e71f78e63f639e4a3809b7df07af21
SHA153642d0894ff7db0aa4a76f97f8757ca8a5babce
SHA256115bf31cd54d63ce70f64336b0e8987367fa72fe060caba9446a2c0cdae35655
SHA512e2069a3faa685ab60e6630f919e1eda777396c370cc1ab06b24a63a379bb45720abcdfa7d918efbe93848eb5a49f52181d04227396c2916b94beca38e0ab1fbb
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
11KB
MD5883eff06ac96966270731e4e22817e11
SHA1523c87c98236cbc04430e87ec19b977595092ac8
SHA25644e5dfd551b38e886214bd6b9c8ee913c4c4d1f085a6575d97c3e892b925da82
SHA51260333253342476911c84bbc1d9bf8a29f811207787fdd6107dce8d2b6e031669303f28133ffc811971ed7792087fe90fb1faabc0af4e91c298ba51e28109a390
-
Filesize
186B
MD5b2f84bf2c8edb65e1b45f7f22b2e58a4
SHA152cd124b613bf29302c3ade38b0b45c53e09e31a
SHA2567e5738d0f82f9408f93d79c7ff98e1fb5e1ffe0bf21476311c96045829fa9aa5
SHA51205c03052e1ba19c4fbfb2f195217b0f79c126e953946a3c44222aff2b3e9fe3fb268adba2d17359013fff4b38780cffc30763f6910b84be3245f7bdb1762814b
-
Filesize
183KB
MD57600056accafb4281250bfed98f0630d
SHA1f61bd219039db28797f8ad62674b029442b7f889
SHA256bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181
SHA5122949a540608b904d909cb8e4a873c3322dbab9a34dbb442c149f05da591ba54b7f2af50620d817560b110b9d1ebd9a6e772a9c70408903cf8e8ade3d35a4cdf0
-
Filesize
183KB
MD57600056accafb4281250bfed98f0630d
SHA1f61bd219039db28797f8ad62674b029442b7f889
SHA256bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181
SHA5122949a540608b904d909cb8e4a873c3322dbab9a34dbb442c149f05da591ba54b7f2af50620d817560b110b9d1ebd9a6e772a9c70408903cf8e8ade3d35a4cdf0
-
Filesize
183KB
MD57600056accafb4281250bfed98f0630d
SHA1f61bd219039db28797f8ad62674b029442b7f889
SHA256bd4754619fc5e08c904356423971e633248aaeed941bcbe924764624a1675181
SHA5122949a540608b904d909cb8e4a873c3322dbab9a34dbb442c149f05da591ba54b7f2af50620d817560b110b9d1ebd9a6e772a9c70408903cf8e8ade3d35a4cdf0