Analysis
-
max time kernel
194s -
max time network
292s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 12:54
Static task
static1
Behavioral task
behavioral1
Sample
915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe
Resource
win7-20221111-en
General
-
Target
915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe
-
Size
131KB
-
MD5
57ff9ec083c9603c0251fe55595b8793
-
SHA1
8c3c7148559706e5523dae28d5852554042129b0
-
SHA256
915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855
-
SHA512
63f50958bd0b82057b62a4315fb9309af082ee06992949c4967bafe83407d7fcc7097d8713b2656cc5ae13c6386ec671d2a424f73b03f883d182551cdaf2770f
-
SSDEEP
3072:cnF6XpaIxS1rAPXJlfWMzMeYhLjYchZzj6ocuxdlh8CKUm2/4v4c:cnvIxAS+MAeYhLjYchZ3rcMl5KUm2/4v
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1384-71-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral1/memory/1112-90-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Laroche.exeLaroche.exepid process 1448 Laroche.exe 1112 Laroche.exe -
Loads dropped DLL 4 IoCs
Processes:
915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exeLaroche.exepid process 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 1384 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 1448 Laroche.exe 1448 Laroche.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Laroche.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Laroche.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\DrakkarNoir = "C:\\Users\\Admin\\AppData\\Roaming\\Drakkar\\Laroche.exe" Laroche.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exeLaroche.exedescription pid process target process PID 332 set thread context of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 1448 set thread context of 1112 1448 Laroche.exe Laroche.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 10 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_1 \Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_2 \Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_1 \Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe nsis_installer_2 -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exeLaroche.exedescription pid process target process PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 332 wrote to memory of 1384 332 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe PID 1384 wrote to memory of 1448 1384 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe Laroche.exe PID 1384 wrote to memory of 1448 1384 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe Laroche.exe PID 1384 wrote to memory of 1448 1384 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe Laroche.exe PID 1384 wrote to memory of 1448 1384 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe Laroche.exe PID 1384 wrote to memory of 1448 1384 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe Laroche.exe PID 1384 wrote to memory of 1448 1384 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe Laroche.exe PID 1384 wrote to memory of 1448 1384 915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe PID 1448 wrote to memory of 1112 1448 Laroche.exe Laroche.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe"C:\Users\Admin\AppData\Local\Temp\915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe"C:\Users\Admin\AppData\Local\Temp\915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe"C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe"C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\biographee\paperers.jqwMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exeFilesize
131KB
MD557ff9ec083c9603c0251fe55595b8793
SHA18c3c7148559706e5523dae28d5852554042129b0
SHA256915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855
SHA51263f50958bd0b82057b62a4315fb9309af082ee06992949c4967bafe83407d7fcc7097d8713b2656cc5ae13c6386ec671d2a424f73b03f883d182551cdaf2770f
-
C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exeFilesize
131KB
MD557ff9ec083c9603c0251fe55595b8793
SHA18c3c7148559706e5523dae28d5852554042129b0
SHA256915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855
SHA51263f50958bd0b82057b62a4315fb9309af082ee06992949c4967bafe83407d7fcc7097d8713b2656cc5ae13c6386ec671d2a424f73b03f883d182551cdaf2770f
-
C:\Users\Admin\AppData\Roaming\Drakkar\Laroche.exeFilesize
131KB
MD557ff9ec083c9603c0251fe55595b8793
SHA18c3c7148559706e5523dae28d5852554042129b0
SHA256915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855
SHA51263f50958bd0b82057b62a4315fb9309af082ee06992949c4967bafe83407d7fcc7097d8713b2656cc5ae13c6386ec671d2a424f73b03f883d182551cdaf2770f
-
\Users\Admin\AppData\Local\Temp\nsk8EFA.tmp\paperers.dllFilesize
56KB
MD5cba27c45fd90779276f96a717de8a8d0
SHA189ac88cc471d5dbf6b9897435dbeeed29df5246f
SHA2569940a5c28cd07e33b24692df50381acdce80574c5e288293981e7b399b2d1e07
SHA512534bb3af058e89510aaea6f3ca4955e0d7b6dbaf1694fc3523ddba4a7845b7b461e711250957c9673c91a7b7e2e92450fbf0365bfb50202b357346cb8c102d95
-
\Users\Admin\AppData\Local\Temp\nsk9ADC.tmp\paperers.dllFilesize
56KB
MD5cba27c45fd90779276f96a717de8a8d0
SHA189ac88cc471d5dbf6b9897435dbeeed29df5246f
SHA2569940a5c28cd07e33b24692df50381acdce80574c5e288293981e7b399b2d1e07
SHA512534bb3af058e89510aaea6f3ca4955e0d7b6dbaf1694fc3523ddba4a7845b7b461e711250957c9673c91a7b7e2e92450fbf0365bfb50202b357346cb8c102d95
-
\Users\Admin\AppData\Roaming\Drakkar\Laroche.exeFilesize
131KB
MD557ff9ec083c9603c0251fe55595b8793
SHA18c3c7148559706e5523dae28d5852554042129b0
SHA256915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855
SHA51263f50958bd0b82057b62a4315fb9309af082ee06992949c4967bafe83407d7fcc7097d8713b2656cc5ae13c6386ec671d2a424f73b03f883d182551cdaf2770f
-
\Users\Admin\AppData\Roaming\Drakkar\Laroche.exeFilesize
131KB
MD557ff9ec083c9603c0251fe55595b8793
SHA18c3c7148559706e5523dae28d5852554042129b0
SHA256915044c511cc81227acb26c559cc79eafdd65f28a99b6c73493b3ac80e739855
SHA51263f50958bd0b82057b62a4315fb9309af082ee06992949c4967bafe83407d7fcc7097d8713b2656cc5ae13c6386ec671d2a424f73b03f883d182551cdaf2770f
-
memory/332-54-0x0000000076931000-0x0000000076933000-memory.dmpFilesize
8KB
-
memory/1112-84-0x0000000000401F8F-mapping.dmp
-
memory/1112-90-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1384-66-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1384-61-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1384-59-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1384-71-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1384-57-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1384-63-0x0000000000401F8F-mapping.dmp
-
memory/1384-62-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1384-56-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1448-69-0x0000000000000000-mapping.dmp