Analysis
-
max time kernel
157s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 05:31
Static task
static1
Behavioral task
behavioral1
Sample
bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.exe
Resource
win7-20220812-en
General
-
Target
bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.exe
-
Size
779KB
-
MD5
d1822b2bd8c78299a0d9b89548800861
-
SHA1
9e04cf773926d88d69d617289a3d413c915a1447
-
SHA256
bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970
-
SHA512
8e4f805c2ff1ba145f1544d3c68b8af834ce557aba1a43d6fb6622cfdae259bec7a65f4a7edb889a2c600c5b838456032f1e40d0c44da48088d56fef9b537e9f
-
SSDEEP
12288:QK2mhAMJ/cPlZZbsRcrjztWwctzEDwU4FhTtcc68h7UHy5y+TS4SMQaD/FYkSZQI:N2O/GlZZSc/zcwSQ94j97Aml9SZW73cF
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4412-160-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral2/memory/4412-166-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
cvfts.execvfts.exepid process 5020 cvfts.exe 2348 cvfts.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
cvfts.exeRegSvcs.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cvfts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tdsdowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\xdkqa\\cvfts.exe C:\\Users\\Admin\\AppData\\Roaming\\xdkqa\\erams.qjj" cvfts.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run RegSvcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tdsdowsUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\xdkqa\\cvfts.exe C:\\Users\\Admin\\AppData\\Roaming\\xdkqa\\erams.qjj" RegSvcs.exe -
Processes:
cvfts.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cvfts.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cvfts.exedescription pid process target process PID 2348 set thread context of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 set thread context of 4592 2348 cvfts.exe RegSvcs.exe -
Drops file in Windows directory 1 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
cvfts.exeRegSvcs.exepid process 5020 cvfts.exe 5020 cvfts.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe 4592 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.execvfts.execvfts.exedescription pid process target process PID 4884 wrote to memory of 5020 4884 bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.exe cvfts.exe PID 4884 wrote to memory of 5020 4884 bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.exe cvfts.exe PID 4884 wrote to memory of 5020 4884 bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.exe cvfts.exe PID 5020 wrote to memory of 2348 5020 cvfts.exe cvfts.exe PID 5020 wrote to memory of 2348 5020 cvfts.exe cvfts.exe PID 5020 wrote to memory of 2348 5020 cvfts.exe cvfts.exe PID 2348 wrote to memory of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4412 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4592 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4592 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4592 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4592 2348 cvfts.exe RegSvcs.exe PID 2348 wrote to memory of 4592 2348 cvfts.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.exe"C:\Users\Admin\AppData\Local\Temp\bad749cf90bba616c3b4dc66bcc60a62b3bcd6286b731e90740f578a0e6d4970.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\xdkqa\cvfts.exe"C:\Users\Admin\AppData\Roaming\xdkqa\cvfts.exe" erams.qjj2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\xdkqa\cvfts.exeC:\Users\Admin\AppData\Roaming\xdkqa\cvfts.exe C:\Users\Admin\AppData\Roaming\xdkqa\MURFG3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"4⤵
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exeC:\Users\Admin\AppData\Roaming\xdkqa\MURFG4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\xdkqa\MURFGFilesize
91KB
MD595da1e6539333b1e58e22e4615cb0138
SHA102f825b227f559539621e3bb042576c9792d61c7
SHA256e56c096e7fbf783f01c6ab0a43792612b0b4659ae10d0109fc4c80c6ee85b98b
SHA51209e75b4bc14339d6d39dcbe0e071fda9a7edd9f74147976b5a3db90ceb3d923e3b5ef00dee4dd2d678fa092566832092dd94c384819a473a17d916de19790daf
-
C:\Users\Admin\AppData\Roaming\xdkqa\YMQGIXFilesize
35KB
MD5f9d66d65727362e615e51559db07d7fe
SHA109365e5eb510b444b2c20a8fa093e6aa4ef07f43
SHA256a047b043788cd7294d4bd8a1f71c0456394450cac7b338a931e104126927b867
SHA512452ec4d88ea531c38a09e28886330561e5ca186260da911703a431759a0ffd20360946c308da761ebb7a48e9ea321c919127f182b4213e4319458b21bdf01980
-
C:\Users\Admin\AppData\Roaming\xdkqa\biqkv.maiFilesize
715B
MD5e1c916e6c61237903f840887f1905de7
SHA117fe92a7872bf76f21fdd5c239046094465e3608
SHA2561df7d095be52f8929793cfedad7bb8b08815c2f8630338f623e11ba30c7c55f9
SHA5121d4c3511b5e4547a0dcd6d751319fb78c82307abeabbadc7abc387928e31c2810c2e9eee8c865dfaec5dc6d6f5bdd92b5afdf4bb7eb5be72b22962bad375432a
-
C:\Users\Admin\AppData\Roaming\xdkqa\bqkin.ghbFilesize
518B
MD53140137ba775ee3755f2cac17594671b
SHA10a3245e363966da6dfb6068adc568ca179319311
SHA256ffa9d9dfb086537d56345becc58098ebf80c21edff724ae1006952f126425090
SHA512bcd84fa42601fe2b494177a28322cc1df48423063f6dbe5e760c64862c96e4249b22131e47dfb6b7c439c1a6c6270b17e1aab695be35b22e29ceccd0774e371c
-
C:\Users\Admin\AppData\Roaming\xdkqa\cnwuc.qmqFilesize
490B
MD5215eecb607900c112dc001aefc537230
SHA1b8bd78aa40b27baec9cda9defeaec1e1b2edfc1e
SHA256800d1699fac1d5f81808d5ffa0182a7468dd2a37b8df05929e1053450438a1e8
SHA512b5c229129383159b2607585be98860cae28cd4ad31fd5a8f0a7e54c2d663656b80c4504ef49060adbd6d6e9a63d51d2ac2029955745794933a2f4c810c35020e
-
C:\Users\Admin\AppData\Roaming\xdkqa\cvfts.exeFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
C:\Users\Admin\AppData\Roaming\xdkqa\cvfts.exeFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
C:\Users\Admin\AppData\Roaming\xdkqa\cvfts.exeFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
C:\Users\Admin\AppData\Roaming\xdkqa\deefo.bocFilesize
614B
MD503a0a784e0f4af96e7d0d477b314c09c
SHA1eb6f0ae424fe0fce5be59ff31194e74526a1d3b5
SHA256d24f376c500d63a801d7b781546b4c6a03690b421e9caee796b2f5bff782fbc0
SHA5128ca10e491e4fa233f54dfe7784ab5af85e2ed0cea43fc690d8ae7905d9b45e7de351ea42d893b2bb8fe4634de736bcf5c7cee04a9c7720309234009877849983
-
C:\Users\Admin\AppData\Roaming\xdkqa\erams.qjjFilesize
812KB
MD54d67e5dc7da1124c1180012a68d6d03f
SHA13d459b217d4f3d9a52e11e39d23cc221cf02942c
SHA2568e8e4aadb976b7f86661adf2de4572ce8338ca467b594e70a9c19d4d9a1f047f
SHA512ba5dfca3446362075d60ec26e084da83b07f5317f74e5317b2ad4ca1ba528019e4cf49b94668940c7e87e4d480114e2abda0b1963e5feaefde7b70bd5d4bf385
-
C:\Users\Admin\AppData\Roaming\xdkqa\ipcne.stvFilesize
69B
MD50127ada206fc0d1199e2b5aeeae08b71
SHA11c7581ff1f0e89da2462abd556d5c400e935f7fb
SHA2561f97bcf15c0448e666c276ce8d020310076c81a4fad956150651acd46a36f1e8
SHA5129f09045c6153061917ab90c56b688fd9c6419cea45c034ec1bcc2167b94c8a2508770a509538ddeeb28e10c6aef2215655c03d1664e52c0402d47f8522a5bf0b
-
C:\Users\Admin\AppData\Roaming\xdkqa\iumje.jeoFilesize
322B
MD5407993b4990acb2da91ac69a7cd0f7e3
SHA1c4dad33e31e42af16452b4d83d084e067ad4b598
SHA256bb78378b82c74348ee170843d352276f0190b49fa2f7366b4b0cd45f142a4a87
SHA5125ca2b25826033296493ea1014af1591e83f4f7ca43d9aa88197a1f25a6f56744300b35d4518bcbb0d7c2917b361d0664a1590cf4b2c592ff510a0bb0595235d7
-
C:\Users\Admin\AppData\Roaming\xdkqa\jculp.ipbFilesize
151B
MD54f8ae0125c7c832ac365e32a38b4ff7c
SHA124c44872dbcfef9954743174eb1e8541f23d2308
SHA256debebd06b840708f2f7578a4c7ad2a74806b44e610ba972f243b8a5e5c85a5b0
SHA5129f5417740332315f01c17aecd1e065babcc188fb3d3d83e4c38b3841b4afa7bba55b76694d48f5a20e340e773c021e654cc00ba6a94d6e05545eaf1ac071a87c
-
C:\Users\Admin\AppData\Roaming\xdkqa\kcFilesize
68KB
MD588e3c114872bc6415e77819bba327bb2
SHA184dd7f9f4035168df99a1b50945fa929adc85db6
SHA256136656e0ec276d798420698631bcb425828ea3518f06d429af39e1224625a5c3
SHA512fa2122c67407855b5fb797b00eb9455a38b1610bc07ca940ddf0efa14ef3778309e435094d8e30453f99e18fe58e668ca1c03b90034fa1060a41928e38902fa5
-
C:\Users\Admin\AppData\Roaming\xdkqa\llbha.emlFilesize
232B
MD506016c50ccd23723695f988848c94e57
SHA13bea075bbf64c144357ddc7bd2d00c70ea77381c
SHA2562b5eb6c09a4c267c3b113844c93f0ed908831db1b4f17cddf718d9eefb02e1f0
SHA512dd1c970f0a2c03bfd50307b10cbea2a0645b67d1866390be1b62a2ee1bd286f1c1b5a60f1e35e8f373c13c494e94fdbc055b2d1fceaad32481d5e114e054b43f
-
C:\Users\Admin\AppData\Roaming\xdkqa\ormtx.nntFilesize
344B
MD5bb4ad69dea7cb930513207431098ace6
SHA1794bdb4034ad40ed2f85b994c816a477a186351b
SHA256dad2de178c582a5e0cdf20bbe5fbf9cb86d182f6ed4ed8027ca348d5bba52d89
SHA512285934638f6242d06638ea9d5d0ac0fe5fe5768262e12a2529c5201fbb359751314745cf1bd2fce35e231c13189a262ed740d979df286303e3b26568d55fea2f
-
C:\Users\Admin\AppData\Roaming\xdkqa\spdFilesize
4B
MD5098f6bcd4621d373cade4e832627b4f6
SHA1a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
SHA2569f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08
SHA512ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff
-
C:\Users\Admin\AppData\Roaming\xdkqa\todjb.qtgFilesize
97B
MD5c35bae4817a01d7c33f0e2dfa6aa4acf
SHA16a3e28ccdd748e2030ebabc325f44c1cc87e9635
SHA25651dd06889efd0d10b715d156f7caac1ea24b3506d2072192c5fd1e5709e57250
SHA51214ad502ae6e92d1edecbedfd42529b8b5674f8801c9300f567d0ab34982524b1a3e632dbf9719d65b1b42910bd539a63710c2f67f93cfd819cac3bcd146d5c84
-
C:\Users\Admin\AppData\Roaming\xdkqa\tuFilesize
91KB
MD578c062b63bd589a1416ede1706d42e9a
SHA1aebde98d2dff43f79b3f7ed9e03b2bbad1277141
SHA2564ace811f03bc7618b4a44175dc45195975bd9f3b64c06dbd737387e35576bfe9
SHA512a3727749da81316ddf51474e76245678f60c54e2c8a488618f0fdf49fcb6f906741bed3ddc7ca85a21ba2e2a9cd928c13a068ed05da87db3e654c6e540933389
-
C:\Users\Admin\AppData\Roaming\xdkqa\uvnof.trrFilesize
294B
MD58712cf87b2f9408098f527144eec7e1a
SHA1c616d9e41bf69b19b3fa4b3e641c2b5f9ae5f07c
SHA256e9b902446216a4d957da17ffd38a84d3214e05da3bc749333ce5bf706bb06f89
SHA5129415913823914bdda784bd8c7f82ba278f437c40dc6f92ef33fca23d816b93e57bb1e1e6b04c5feab1307291f46c8f9bb7045291512ada48eececec347218286
-
C:\Users\Admin\AppData\Roaming\xdkqa\vbcju.fqgFilesize
112B
MD5b7af9a9105f2fcd6609bb1c8c03483b7
SHA1fcd3a7d9d4a7553d72b2d81427f66de98ace3ccc
SHA25658894fc086c297a053afe4aaa9fbc247b4db75ad66318ba9a69a5ee0089d3275
SHA5129ffc73635e67aa6f060c623f6aaf57ba10244211e2d631833602eaf528cb90a7264c228fa546b7cfb14c00d74ad324aa4b19b9f0ef48251299e124c7809f5382
-
C:\Users\Admin\AppData\Roaming\xdkqa\xlqhq.llvFilesize
228B
MD56ccd6fbde99d702c3a8e9945d7f95f80
SHA1a022325da53f57be088a8cc4c39801b2b98e3b11
SHA2560c291881413ae95ac9399bd8fe7ed295112f191ca5bc4555632c831974290b42
SHA5128453ff36eae89c392d62b0f36aee025e182c4930606d0b832a9aed58c090f8a24ee453aff19c16c17d74ef218dc2b37e62b0876888f6a36ba5d008a02337fd24
-
memory/2348-152-0x0000000000000000-mapping.dmp
-
memory/4412-166-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/4412-155-0x0000000000000000-mapping.dmp
-
memory/4412-156-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/4412-158-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/4412-160-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/4592-159-0x0000000000000000-mapping.dmp
-
memory/4592-163-0x0000000000D30000-0x0000000000DFC000-memory.dmpFilesize
816KB
-
memory/4592-164-0x0000000000D30000-0x0000000000DFC000-memory.dmpFilesize
816KB
-
memory/4592-161-0x0000000000D30000-0x0000000000DFC000-memory.dmpFilesize
816KB
-
memory/4592-167-0x0000000000D30000-0x0000000000DFC000-memory.dmpFilesize
816KB
-
memory/5020-132-0x0000000000000000-mapping.dmp