Analysis
-
max time kernel
131s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe
Resource
win7-20220812-en
General
-
Target
1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe
-
Size
187KB
-
MD5
01a713e9c0dfaaaed49ad3c77bd23b8c
-
SHA1
91ae5b3f67e51a076c002a68d57450822f644836
-
SHA256
1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be
-
SHA512
d59461758a50496fa8f8aa2b0471c31210f43d333f1809e5fe7b5f37d62c607ca1b8e3fc2a030abdc2e5edd568f85b6b4a96ce0d660832d396a752a4ef89c4cc
-
SSDEEP
3072:RoBYrfOh1KnnD69k9sjze6sFFUZedvaW64lfQ83VpvGaNbCvV7qSZJPfX0Li:RcJgD/9B5CZela+lX3bCt7qSZH
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1192-73-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1192-80-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
Processes:
Tradesee.exeTradesee.exeTradesee.exepid process 1796 Tradesee.exe 908 Tradesee.exe 1192 Tradesee.exe -
Drops startup file 1 IoCs
Processes:
1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Behindnote.lnk 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe -
Loads dropped DLL 2 IoCs
Processes:
1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exepid process 1452 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe 1452 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Tradesee.exedescription pid process target process PID 1796 set thread context of 1192 1796 Tradesee.exe Tradesee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Tradesee.exepid process 1796 Tradesee.exe 1796 Tradesee.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Tradesee.exedescription pid process Token: SeDebugPrivilege 1796 Tradesee.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exeTradesee.exedescription pid process target process PID 1452 wrote to memory of 1796 1452 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe Tradesee.exe PID 1452 wrote to memory of 1796 1452 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe Tradesee.exe PID 1452 wrote to memory of 1796 1452 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe Tradesee.exe PID 1452 wrote to memory of 1796 1452 1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe Tradesee.exe PID 1796 wrote to memory of 908 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 908 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 908 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 908 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 908 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 1192 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 1192 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 1192 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 1192 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 1192 1796 Tradesee.exe Tradesee.exe PID 1796 wrote to memory of 1192 1796 Tradesee.exe Tradesee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe"C:\Users\Admin\AppData\Local\Temp\1e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Makingread\Tradesee.exe"C:\ProgramData\Makingread\Tradesee.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Makingread\Tradesee.exeC:\ProgramData\Makingread\Tradesee.exe3⤵
- Executes dropped EXE
-
C:\ProgramData\Makingread\Tradesee.exeC:\ProgramData\Makingread\Tradesee.exe3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Makingread\Tradesee.exeFilesize
187KB
MD501a713e9c0dfaaaed49ad3c77bd23b8c
SHA191ae5b3f67e51a076c002a68d57450822f644836
SHA2561e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be
SHA512d59461758a50496fa8f8aa2b0471c31210f43d333f1809e5fe7b5f37d62c607ca1b8e3fc2a030abdc2e5edd568f85b6b4a96ce0d660832d396a752a4ef89c4cc
-
C:\ProgramData\Makingread\Tradesee.exeFilesize
187KB
MD501a713e9c0dfaaaed49ad3c77bd23b8c
SHA191ae5b3f67e51a076c002a68d57450822f644836
SHA2561e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be
SHA512d59461758a50496fa8f8aa2b0471c31210f43d333f1809e5fe7b5f37d62c607ca1b8e3fc2a030abdc2e5edd568f85b6b4a96ce0d660832d396a752a4ef89c4cc
-
C:\ProgramData\Makingread\Tradesee.exeFilesize
187KB
MD501a713e9c0dfaaaed49ad3c77bd23b8c
SHA191ae5b3f67e51a076c002a68d57450822f644836
SHA2561e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be
SHA512d59461758a50496fa8f8aa2b0471c31210f43d333f1809e5fe7b5f37d62c607ca1b8e3fc2a030abdc2e5edd568f85b6b4a96ce0d660832d396a752a4ef89c4cc
-
C:\ProgramData\Makingread\Tradesee.exeFilesize
187KB
MD501a713e9c0dfaaaed49ad3c77bd23b8c
SHA191ae5b3f67e51a076c002a68d57450822f644836
SHA2561e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be
SHA512d59461758a50496fa8f8aa2b0471c31210f43d333f1809e5fe7b5f37d62c607ca1b8e3fc2a030abdc2e5edd568f85b6b4a96ce0d660832d396a752a4ef89c4cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\26AD01F9C002FAD37427E734302383D8_8591D99E88513CEACEDF0CE25181F50BFilesize
471B
MD5456b3fa310255d0f0abf18230151a915
SHA15264e87eec264ee5db27cbba0eb6999ab8631872
SHA2562f138c4881083940ca6af61f3fa24dfe8f271c8e9e71fb1eecdff02bddcacb37
SHA51254919204bb96197985c7b814ed343f979feb9b1d2d333dcc88231e0dbaab80701fdb15563d119d1402efdace41dcef4a604e05f0aa233521d0c196a4e60335f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD53dcf580a93972319e82cafbc047d34d5
SHA18528d2a1363e5de77dc3b1142850e51ead0f4b6b
SHA25640810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1
SHA51298384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EE44ECA143B76F2B9F2A5AA75B5D1EC6_847118BE2683F0C241D1D702F3A3F5F9Filesize
471B
MD54c93b1193d50085fb80df1f646629463
SHA17c6eed83fe292d5532e8e5fe5acf11172d7139a2
SHA256a093f6b4637bc082d6bb6d0efb0b037fb9b0a186a66e89176ef0bddef7e30717
SHA51272b88491815d7a8408dbe468a367719fac913384d3b0786ba421d0863629575bbb903c48c0962917401dd2f42fab0caf80163edb379d12e5449ec7551fa35123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26AD01F9C002FAD37427E734302383D8_8591D99E88513CEACEDF0CE25181F50BFilesize
426B
MD588b2c17dfc24ae9356a333bb79330301
SHA108619c26d4254a1d0b5a6e9cba6cd16baa747a9b
SHA2562af01e8d1dae29dbd1cab67f1551461b76314634bc5ca0074250a1b53eecd4ef
SHA5129bde66af073f8f614c86883f20770b7438437fae332eff193a11114e5de665e9cf32500d0c79f7c53f889983037f8291b5e3d4e45f79ec84d17d463f18ce1465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5493ef64626923ec66b5d88a12c84e49e
SHA1271f741222e21ef075f4b3a662ce4010d269a35e
SHA2569b4149597671f404a371c591e1a6caf25774efded05f18653f3bbbbaf80f2ea4
SHA512dfa15d1481dcc633f61beac5e9e9727f839bec6943411670b95163f4e8a3b975f1dd471a6b4a181a4826d25f590c05cadc383a41ee8f188803f6a642f923481a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EE44ECA143B76F2B9F2A5AA75B5D1EC6_847118BE2683F0C241D1D702F3A3F5F9Filesize
438B
MD5c9f84c06ba9c2433a8b88b7677289e53
SHA13df4c45187cd2ceafecf5800c571246829e17ee9
SHA256060a405fbb319b559ee8d755e850d6a09b5b54e717b5326cc7c7000e3de68ea6
SHA51226def403f35e44662d67234b933174c5b4dfd383e784ca1a40844cad93c3dad8aacaa2154eeebfba4a73634b05750148d2a448c6538764d29d28bc45d2f9ecb1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Behindnote.lnkFilesize
906B
MD5d69f615c90a8d68c140bfb6d4a85876b
SHA1c581b00ab79e9412bc7126dffb493e2c8b2074b9
SHA256774d9b53e1e8315e3b7de035debd6a3d1af7f4d846bc130ded4f4704afe23a26
SHA51208eab8d0ccbe820ca3f5984aa86f400595df4c09e3c630b9637fa1f472daed1237f946a4d118673b509b72f21dab01c514d96d47ecf61c494aa7987c967acc92
-
\ProgramData\Makingread\Tradesee.exeFilesize
187KB
MD501a713e9c0dfaaaed49ad3c77bd23b8c
SHA191ae5b3f67e51a076c002a68d57450822f644836
SHA2561e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be
SHA512d59461758a50496fa8f8aa2b0471c31210f43d333f1809e5fe7b5f37d62c607ca1b8e3fc2a030abdc2e5edd568f85b6b4a96ce0d660832d396a752a4ef89c4cc
-
\ProgramData\Makingread\Tradesee.exeFilesize
187KB
MD501a713e9c0dfaaaed49ad3c77bd23b8c
SHA191ae5b3f67e51a076c002a68d57450822f644836
SHA2561e4a27850b6739e16df5786f16cc322042e9e6cf5734c5e213f1b2e0f93984be
SHA512d59461758a50496fa8f8aa2b0471c31210f43d333f1809e5fe7b5f37d62c607ca1b8e3fc2a030abdc2e5edd568f85b6b4a96ce0d660832d396a752a4ef89c4cc
-
memory/1192-73-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1192-80-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1452-54-0x0000000075041000-0x0000000075043000-memory.dmpFilesize
8KB
-
memory/1452-69-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB
-
memory/1452-56-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB
-
memory/1452-55-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB
-
memory/1796-59-0x0000000000000000-mapping.dmp
-
memory/1796-70-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB
-
memory/1796-81-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB