Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:50
Static task
static1
Behavioral task
behavioral1
Sample
1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe
Resource
win10v2004-20221111-en
General
-
Target
1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe
-
Size
204KB
-
MD5
205848af8f42bb58eb75691d63914680
-
SHA1
03a9291302adb5547770ad9fd9c154bcee0b4cf6
-
SHA256
1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4
-
SHA512
3ccac74913e87b9c532cb9fc47bb7d87b263c1d1fc5195e8931c871d46981aeb03cc21b17bad9e9d7c225c28dcaaa57aebe6895bca6003b01c7bab1a6f764d83
-
SSDEEP
3072:MeirItZs7DbxRmBIrqfD+jKzbIXEoKxXFBbhkBJlOqvLu2d71KBscrvjVe:MeiEoDtWLmEBbKB/OkSc/07E
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1984-57-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral1/memory/2032-65-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 824 Host.exe 2032 Host.exe -
Loads dropped DLL 1 IoCs
Processes:
1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exepid process 1984 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\rewtyrg = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exeHost.exedescription pid process target process PID 1976 set thread context of 1984 1976 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe PID 824 set thread context of 2032 824 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exeHost.exepid process 1976 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe 824 Host.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exeHost.exepid process 1976 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe 1976 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe 824 Host.exe 824 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exeHost.exedescription pid process target process PID 1976 wrote to memory of 1984 1976 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe PID 1976 wrote to memory of 1984 1976 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe PID 1976 wrote to memory of 1984 1976 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe PID 1976 wrote to memory of 1984 1976 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe PID 1984 wrote to memory of 824 1984 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe Host.exe PID 1984 wrote to memory of 824 1984 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe Host.exe PID 1984 wrote to memory of 824 1984 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe Host.exe PID 1984 wrote to memory of 824 1984 1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe Host.exe PID 824 wrote to memory of 2032 824 Host.exe Host.exe PID 824 wrote to memory of 2032 824 Host.exe Host.exe PID 824 wrote to memory of 2032 824 Host.exe Host.exe PID 824 wrote to memory of 2032 824 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe"C:\Users\Admin\AppData\Local\Temp\1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe"C:\Users\Admin\AppData\Local\Temp\1d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2032
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5205848af8f42bb58eb75691d63914680
SHA103a9291302adb5547770ad9fd9c154bcee0b4cf6
SHA2561d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4
SHA5123ccac74913e87b9c532cb9fc47bb7d87b263c1d1fc5195e8931c871d46981aeb03cc21b17bad9e9d7c225c28dcaaa57aebe6895bca6003b01c7bab1a6f764d83
-
Filesize
204KB
MD5205848af8f42bb58eb75691d63914680
SHA103a9291302adb5547770ad9fd9c154bcee0b4cf6
SHA2561d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4
SHA5123ccac74913e87b9c532cb9fc47bb7d87b263c1d1fc5195e8931c871d46981aeb03cc21b17bad9e9d7c225c28dcaaa57aebe6895bca6003b01c7bab1a6f764d83
-
Filesize
204KB
MD5205848af8f42bb58eb75691d63914680
SHA103a9291302adb5547770ad9fd9c154bcee0b4cf6
SHA2561d5bd2883deb901304374c94c53111c651b84a93b42dfebe7130fbfe8fe659c4
SHA5123ccac74913e87b9c532cb9fc47bb7d87b263c1d1fc5195e8931c871d46981aeb03cc21b17bad9e9d7c225c28dcaaa57aebe6895bca6003b01c7bab1a6f764d83