Analysis
-
max time kernel
164s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 13:35
Static task
static1
Behavioral task
behavioral1
Sample
INV_0893.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
INV_0893.exe
Resource
win10v2004-20220812-en
General
-
Target
INV_0893.exe
-
Size
1.2MB
-
MD5
d23e1e317d68720216699e1c9e524a78
-
SHA1
76b58185f5aa824e5bafc589aaa6c228b341b239
-
SHA256
8dda840eccb53427037b3a06dd5f886c78e6e55fe69d96b256b05176e85172db
-
SHA512
38a7d77645a9b2eb2bb9ec05c0f0c561a23aecadc7b5206f30bb98aa6bd97722af6a7174e371576deb389f53d58836b501e5ef1acf35da285ff5469784b5b021
-
SSDEEP
24576:5AOcZgAgB9ZE+UDuAWGyrb1pUVgfMgLAWDXxo8FVCaWXZWcbISNY:zTAgBLUDqZ1+O3VokCp7U+Y
Malware Config
Extracted
netwire
212.193.30.230:3363
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password@2
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1456-138-0x0000000000D50000-0x0000000001258000-memory.dmp netwire behavioral2/memory/1456-139-0x0000000000D5242D-mapping.dmp netwire behavioral2/memory/1456-142-0x0000000000D50000-0x0000000001258000-memory.dmp netwire behavioral2/memory/1456-143-0x0000000000D50000-0x0000000001258000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
uvbdlqfvw.pifRegSvcs.exepid process 5060 uvbdlqfvw.pif 1456 RegSvcs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
INV_0893.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation INV_0893.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
uvbdlqfvw.pifdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run uvbdlqfvw.pif Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\1_102\\UVBDLQ~1.PIF C:\\Users\\Admin\\1_102\\FAEUPD~1.AFR" uvbdlqfvw.pif -
Suspicious use of SetThreadContext 1 IoCs
Processes:
uvbdlqfvw.pifdescription pid process target process PID 5060 set thread context of 1456 5060 uvbdlqfvw.pif RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
uvbdlqfvw.pifpid process 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif 5060 uvbdlqfvw.pif -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
INV_0893.exeuvbdlqfvw.pifdescription pid process target process PID 1396 wrote to memory of 5060 1396 INV_0893.exe uvbdlqfvw.pif PID 1396 wrote to memory of 5060 1396 INV_0893.exe uvbdlqfvw.pif PID 1396 wrote to memory of 5060 1396 INV_0893.exe uvbdlqfvw.pif PID 5060 wrote to memory of 1456 5060 uvbdlqfvw.pif RegSvcs.exe PID 5060 wrote to memory of 1456 5060 uvbdlqfvw.pif RegSvcs.exe PID 5060 wrote to memory of 1456 5060 uvbdlqfvw.pif RegSvcs.exe PID 5060 wrote to memory of 1456 5060 uvbdlqfvw.pif RegSvcs.exe PID 5060 wrote to memory of 1456 5060 uvbdlqfvw.pif RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\INV_0893.exe"C:\Users\Admin\AppData\Local\Temp\INV_0893.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\1_102\uvbdlqfvw.pif"C:\Users\Admin\1_102\uvbdlqfvw.pif" faeupdrjbw.afr2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
PID:1456
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170.9MB
MD5effba2d361bf03eca0d7b874614a995a
SHA1df02fafbc0864975b8e55cd7ff3ec75bcfbe5212
SHA256ca4eefbee52dfb136b739ed8c49265c620e61956acf85fd6e4735d0347700c01
SHA512b2e35bb21df6b1362f051ae24f1e8f534e77ca8ccf6cfaa17c54a4137e1547031c3273a117b127b465c04596f8d5edd47c36bd5532c19f0534df41ef0fb00104
-
Filesize
323KB
MD5eb1ccd9ad7c05d6f77e14f488a7ecd7b
SHA12d3b3d67fc34052680419279308e93ecabc2f0f5
SHA2569c6be7508c3de7d4502f32f167129ac5ecdaa2a8a83825cd1826110b5551cf2e
SHA5126f37dcefaa02d82ed509a441486dffb3fd148a8958b97c405b13075577774af8678be07a8bf86d38b6c9268b6337bf773d84d80c244348cc90538bd196c302d5
-
Filesize
51KB
MD5b7a0a87bbcc941bec34fd8acdcdd077a
SHA18c0c9adb7b9e1806aa4c49811fa4a2794490c645
SHA256650e29ad1c2a6b951ee4868a5b1d350c8938e942e1796d7a48e52e8f93cabfda
SHA512830604c84b91dc9012e094f20bf76ebf81acd6e85825c4481290e81def2d18b281c132a4ba817d9cf3fd43a5f5c62a0b40a557b176e8e94a2dca146c0651f2c3
-
Filesize
906KB
MD5f28aa08788132e64db4b8918ee2430b1
SHA1ef32b1023a89dc36d7c5e98e22845fe87c5efef2
SHA256f99b9fc041c177f0bee2c82d09f451ef0833696111b1b37cbfff8c975232ece2
SHA512689cf6118061aa9e7d4b78118db99338aa767433df511610d471a989825a84a53119310248ed3870b10e48e77b47c429ef5a276dbc9c4ec53a7588e16093b50f
-
Filesize
906KB
MD5f28aa08788132e64db4b8918ee2430b1
SHA1ef32b1023a89dc36d7c5e98e22845fe87c5efef2
SHA256f99b9fc041c177f0bee2c82d09f451ef0833696111b1b37cbfff8c975232ece2
SHA512689cf6118061aa9e7d4b78118db99338aa767433df511610d471a989825a84a53119310248ed3870b10e48e77b47c429ef5a276dbc9c4ec53a7588e16093b50f
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b