Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 03:29
Static task
static1
Behavioral task
behavioral1
Sample
3f153b9bfc044bb0c370cabd0496c8a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f153b9bfc044bb0c370cabd0496c8a6.exe
Resource
win10v2004-20220901-en
General
-
Target
3f153b9bfc044bb0c370cabd0496c8a6.exe
-
Size
1.1MB
-
MD5
3f153b9bfc044bb0c370cabd0496c8a6
-
SHA1
f98e3e3a0f5fc735f7167367fa272b5365595548
-
SHA256
67b10001ec5c141e48e61d73c2c4d8c2c1170eecfbe8732ea5b3069d6cd333b0
-
SHA512
a53caea88f5719ec51abbfa119aa4cfd0df9a4d90acd33356008bcfba2c45bdf60a6bacc69512969367dcc86c388da2d017bc1a7bfaed6c7cb1dc18fcf483982
-
SSDEEP
24576:MAOcZXgZd9/37Y0W8AHei8Jluw0ixrZYZj7w84cKSVlioyvt1qztey4ZodO:a3X7DLJYLilZYZjUcKsscey4Z7
Malware Config
Signatures
-
NetWire RAT payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/964-67-0x0000000000230000-0x0000000000835000-memory.dmp netwire behavioral1/memory/964-68-0x00000000002326D0-mapping.dmp netwire behavioral1/memory/964-71-0x0000000000230000-0x0000000000835000-memory.dmp netwire behavioral1/memory/964-73-0x0000000000230000-0x0000000000835000-memory.dmp netwire behavioral1/memory/1840-74-0x0000000140000000-0x00000001405E8000-memory.dmp netwire behavioral1/memory/964-76-0x0000000000230000-0x0000000000835000-memory.dmp netwire behavioral1/memory/1840-77-0x0000000140000000-0x00000001405E8000-memory.dmp netwire behavioral1/memory/408-81-0x0000000140000000-0x00000001405E8000-memory.dmp netwire behavioral1/memory/408-82-0x0000000140000000-0x00000001405E8000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
iblekdu.pifpid process 1548 iblekdu.pif -
Loads dropped DLL 4 IoCs
Processes:
3f153b9bfc044bb0c370cabd0496c8a6.exepid process 1452 3f153b9bfc044bb0c370cabd0496c8a6.exe 1452 3f153b9bfc044bb0c370cabd0496c8a6.exe 1452 3f153b9bfc044bb0c370cabd0496c8a6.exe 1452 3f153b9bfc044bb0c370cabd0496c8a6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
iblekdu.pifdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iblekdu.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\1_63\\iblekdu.pif C:\\Users\\Admin\\AppData\\Roaming\\1_63\\oktfka.tel" iblekdu.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
iblekdu.pifdescription pid process target process PID 1548 set thread context of 964 1548 iblekdu.pif RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
perfmon.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz perfmon.exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 perfmon.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exeperfmon.exepid process 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 408 perfmon.exe 408 perfmon.exe 408 perfmon.exe 1840 taskmgr.exe 408 perfmon.exe 1840 taskmgr.exe 408 perfmon.exe 1840 taskmgr.exe 408 perfmon.exe 1840 taskmgr.exe 408 perfmon.exe 1840 taskmgr.exe 408 perfmon.exe 1840 taskmgr.exe 408 perfmon.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1840 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
taskmgr.exeperfmon.exedescription pid process Token: SeDebugPrivilege 1840 taskmgr.exe Token: SeDebugPrivilege 408 perfmon.exe Token: SeSystemProfilePrivilege 408 perfmon.exe Token: SeCreateGlobalPrivilege 408 perfmon.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe 1840 taskmgr.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
3f153b9bfc044bb0c370cabd0496c8a6.exeiblekdu.piftaskmgr.exedescription pid process target process PID 1452 wrote to memory of 1548 1452 3f153b9bfc044bb0c370cabd0496c8a6.exe iblekdu.pif PID 1452 wrote to memory of 1548 1452 3f153b9bfc044bb0c370cabd0496c8a6.exe iblekdu.pif PID 1452 wrote to memory of 1548 1452 3f153b9bfc044bb0c370cabd0496c8a6.exe iblekdu.pif PID 1452 wrote to memory of 1548 1452 3f153b9bfc044bb0c370cabd0496c8a6.exe iblekdu.pif PID 1548 wrote to memory of 964 1548 iblekdu.pif RegSvcs.exe PID 1548 wrote to memory of 964 1548 iblekdu.pif RegSvcs.exe PID 1548 wrote to memory of 964 1548 iblekdu.pif RegSvcs.exe PID 1548 wrote to memory of 964 1548 iblekdu.pif RegSvcs.exe PID 1548 wrote to memory of 964 1548 iblekdu.pif RegSvcs.exe PID 1548 wrote to memory of 964 1548 iblekdu.pif RegSvcs.exe PID 1548 wrote to memory of 964 1548 iblekdu.pif RegSvcs.exe PID 1548 wrote to memory of 964 1548 iblekdu.pif RegSvcs.exe PID 1548 wrote to memory of 964 1548 iblekdu.pif RegSvcs.exe PID 1840 wrote to memory of 408 1840 taskmgr.exe perfmon.exe PID 1840 wrote to memory of 408 1840 taskmgr.exe perfmon.exe PID 1840 wrote to memory of 408 1840 taskmgr.exe perfmon.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f153b9bfc044bb0c370cabd0496c8a6.exe"C:\Users\Admin\AppData\Local\Temp\3f153b9bfc044bb0c370cabd0496c8a6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\1_63\iblekdu.pif"C:\Users\Admin\AppData\Roaming\1_63\iblekdu.pif" oktfka.tel2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\perfmon.exe"C:\Windows\System32\perfmon.exe" /res2⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\1_63\gbtbesnvka.soxFilesize
255KB
MD5994e61c5fbfab669f92fe05ad6c41261
SHA1baf03170eb86687bc99538a4e20da67bc865a30a
SHA256751d70e4c128e63edf3cb9a1318a93c26e015afffa49c068ef9a2299aa1c3419
SHA512aac40c80127e4b5d31a452918cad4f05a3c727e262f2f304e0a2c4d755c6840bd7005ce67f400c422b58c459624cd7d2c6cef251822a62aa704db77049eba144
-
C:\Users\Admin\AppData\Roaming\1_63\iblekdu.pifFilesize
1.3MB
MD592b9ea22338dcd34bc1d8bef60a635a4
SHA1b7da7f7f1533e073463ba02f986e5c17e15d39c3
SHA25621dd8e3960c9e3f987a40d30fdb7ebbe9139dfa9b5e5700e36cbd209f36269d0
SHA512ff8922aab4ef89f6c67921274a35c558f88e419e43312252a744123e25981f2f297c6bc00ac57d462f66cf99ce24cc642a2fbf84861c0875d30486271fb712f5
-
C:\Users\Admin\AppData\Roaming\1_63\oktfka.telFilesize
108.1MB
MD52614f99057f77ea896bf754df72c1a5b
SHA1b39d3f49f7df041f133058a6049ac0e003990067
SHA25684533a67653704948d5a13b26a07414409e9d90dbadde2832ad8dd77c635a1e1
SHA51238ac71fb7b5cd3b583aff749e67fbfd11e9ea3cc765ef4c5da63af41274e09b94ff6720ffc0c6b373d158000a47bee232ec2209ad3f7284f505bb9607d3ddc9c
-
C:\Users\Admin\AppData\Roaming\1_63\xrldqwbq.exeFilesize
60KB
MD58832c45bc05321379de0200c7819b9b3
SHA1bf5d00fcc81dd64ca3bdaec714efae9b0e7b961d
SHA256ae785b502e2d1136430d3c8b0a080534170d1d5e0466091113ff1fb967a77f25
SHA5125b3cdb80bf3f576cbedb55259038dc534f394ef48408dc7cecb74ab8c664b70b3c2fc79b9e9ac84f1819714345508470da2b67e56f9d818daafba4e34d597fbf
-
\Users\Admin\AppData\Roaming\1_63\iblekdu.pifFilesize
1.3MB
MD592b9ea22338dcd34bc1d8bef60a635a4
SHA1b7da7f7f1533e073463ba02f986e5c17e15d39c3
SHA25621dd8e3960c9e3f987a40d30fdb7ebbe9139dfa9b5e5700e36cbd209f36269d0
SHA512ff8922aab4ef89f6c67921274a35c558f88e419e43312252a744123e25981f2f297c6bc00ac57d462f66cf99ce24cc642a2fbf84861c0875d30486271fb712f5
-
\Users\Admin\AppData\Roaming\1_63\iblekdu.pifFilesize
1.3MB
MD592b9ea22338dcd34bc1d8bef60a635a4
SHA1b7da7f7f1533e073463ba02f986e5c17e15d39c3
SHA25621dd8e3960c9e3f987a40d30fdb7ebbe9139dfa9b5e5700e36cbd209f36269d0
SHA512ff8922aab4ef89f6c67921274a35c558f88e419e43312252a744123e25981f2f297c6bc00ac57d462f66cf99ce24cc642a2fbf84861c0875d30486271fb712f5
-
\Users\Admin\AppData\Roaming\1_63\iblekdu.pifFilesize
1.3MB
MD592b9ea22338dcd34bc1d8bef60a635a4
SHA1b7da7f7f1533e073463ba02f986e5c17e15d39c3
SHA25621dd8e3960c9e3f987a40d30fdb7ebbe9139dfa9b5e5700e36cbd209f36269d0
SHA512ff8922aab4ef89f6c67921274a35c558f88e419e43312252a744123e25981f2f297c6bc00ac57d462f66cf99ce24cc642a2fbf84861c0875d30486271fb712f5
-
\Users\Admin\AppData\Roaming\1_63\iblekdu.pifFilesize
1.3MB
MD592b9ea22338dcd34bc1d8bef60a635a4
SHA1b7da7f7f1533e073463ba02f986e5c17e15d39c3
SHA25621dd8e3960c9e3f987a40d30fdb7ebbe9139dfa9b5e5700e36cbd209f36269d0
SHA512ff8922aab4ef89f6c67921274a35c558f88e419e43312252a744123e25981f2f297c6bc00ac57d462f66cf99ce24cc642a2fbf84861c0875d30486271fb712f5
-
memory/408-79-0x0000000000000000-mapping.dmp
-
memory/408-83-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/408-82-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/408-81-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/964-68-0x00000000002326D0-mapping.dmp
-
memory/964-71-0x0000000000230000-0x0000000000835000-memory.dmpFilesize
6.0MB
-
memory/964-73-0x0000000000230000-0x0000000000835000-memory.dmpFilesize
6.0MB
-
memory/964-76-0x0000000000230000-0x0000000000835000-memory.dmpFilesize
6.0MB
-
memory/964-67-0x0000000000230000-0x0000000000835000-memory.dmpFilesize
6.0MB
-
memory/964-65-0x0000000000230000-0x0000000000835000-memory.dmpFilesize
6.0MB
-
memory/1452-54-0x0000000075041000-0x0000000075043000-memory.dmpFilesize
8KB
-
memory/1548-59-0x0000000000000000-mapping.dmp
-
memory/1840-72-0x000007FEFBC61000-0x000007FEFBC63000-memory.dmpFilesize
8KB
-
memory/1840-74-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1840-75-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1840-77-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1840-78-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB