Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 21:12
Static task
static1
Behavioral task
behavioral1
Sample
f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe
Resource
win10v2004-20220901-en
General
-
Target
f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe
-
Size
85KB
-
MD5
a1fa94f6a3152f357ea81ab6e5d4e0b0
-
SHA1
d739823af398a63766671fa75b1e2f3deae65fd6
-
SHA256
f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4
-
SHA512
4aa3a4cb9c36aef859d286576efaf099e64ceb9e4759c303f823b6b0fbb9751da39ae60bd2bb680020d58b4236d74b5a1c9e41636737acd12c3df833d74cadc8
-
SSDEEP
1536:EKDAfxn6ptAU1iASaS82Hu7hNYPhWe7WHfVQa9zHU2BBLrgUoYXj3WxyEGLD8:EKDAIpthLSVYhePhPqHfaaZpvSu8
Malware Config
Signatures
-
NetWire RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/460-75-0x0000000000400000-0x0000000000418000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
Host.exepid process 1488 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.execvtres.exepid process 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe 460 cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\bVsS7o2nDI = "C:\\Users\\Admin\\AppData\\Roaming\\eIOKfjAZ\\qfc4rnO.exe.lnk" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exedescription pid process target process PID 1064 set thread context of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exepid process 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exedescription pid process Token: SeDebugPrivilege 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.execmd.execvtres.exedescription pid process target process PID 1064 wrote to memory of 1372 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cmd.exe PID 1064 wrote to memory of 1372 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cmd.exe PID 1064 wrote to memory of 1372 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cmd.exe PID 1064 wrote to memory of 1372 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cmd.exe PID 1372 wrote to memory of 552 1372 cmd.exe reg.exe PID 1372 wrote to memory of 552 1372 cmd.exe reg.exe PID 1372 wrote to memory of 552 1372 cmd.exe reg.exe PID 1372 wrote to memory of 552 1372 cmd.exe reg.exe PID 1064 wrote to memory of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe PID 1064 wrote to memory of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe PID 1064 wrote to memory of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe PID 1064 wrote to memory of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe PID 1064 wrote to memory of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe PID 1064 wrote to memory of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe PID 1064 wrote to memory of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe PID 1064 wrote to memory of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe PID 1064 wrote to memory of 460 1064 f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe cvtres.exe PID 460 wrote to memory of 1488 460 cvtres.exe Host.exe PID 460 wrote to memory of 1488 460 cvtres.exe Host.exe PID 460 wrote to memory of 1488 460 cvtres.exe Host.exe PID 460 wrote to memory of 1488 460 cvtres.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe"C:\Users\Admin\AppData\Local\Temp\f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "bVsS7o2nDI" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\eIOKfjAZ\qfc4rnO.exe.lnk"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "bVsS7o2nDI" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\eIOKfjAZ\qfc4rnO.exe.lnk"3⤵
- Adds Run key to start application
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
\Users\Admin\AppData\Roaming\eIOKfjAZ\qfc4rnO.exeFilesize
85KB
MD5a1fa94f6a3152f357ea81ab6e5d4e0b0
SHA1d739823af398a63766671fa75b1e2f3deae65fd6
SHA256f95ca970fd36c1bd26cc1cb4a3906dcfce59ae7295853f474dc12256abb0afb4
SHA5124aa3a4cb9c36aef859d286576efaf099e64ceb9e4759c303f823b6b0fbb9751da39ae60bd2bb680020d58b4236d74b5a1c9e41636737acd12c3df833d74cadc8
-
memory/460-70-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/460-75-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/460-59-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/460-64-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/460-62-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/460-66-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/460-60-0x0000000000400000-0x0000000000418000-memory.dmpFilesize
96KB
-
memory/460-67-0x0000000000401FEC-mapping.dmp
-
memory/552-58-0x0000000000000000-mapping.dmp
-
memory/1064-71-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/1064-54-0x0000000075BB1000-0x0000000075BB3000-memory.dmpFilesize
8KB
-
memory/1064-55-0x0000000074760000-0x0000000074D0B000-memory.dmpFilesize
5.7MB
-
memory/1372-57-0x0000000000000000-mapping.dmp
-
memory/1488-73-0x0000000000000000-mapping.dmp