Analysis
-
max time kernel
148s -
max time network
188s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:52
Static task
static1
Behavioral task
behavioral1
Sample
464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe
Resource
win10v2004-20221111-en
General
-
Target
464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe
-
Size
495KB
-
MD5
0625a11eec4cf2ea408af4bb1da1db67
-
SHA1
5d0d9aea2a4f9093e35dff127401f1d14051b255
-
SHA256
464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef
-
SHA512
509feabb0757d3dbbc271914d86390d215ca420eb5bec4c11a8c8f899918ecdaa87c64a14a3e944a2f1818d2e8b0763d80b88a77bdd0ff40a5a68074451fa65f
-
SSDEEP
12288:VgDZ0hrDBH+xbPRNOFANn2kScwhvmZ2APfE3UOA:Vi0hJHOPvO6pjmhvmZ2A3l
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\tmp.exe netwire \Users\Admin\AppData\Local\Temp\tmp.exe netwire C:\Users\Admin\AppData\Local\Temp\tmp.exe netwire behavioral1/memory/560-67-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/560-70-0x0000000000402196-mapping.dmp netwire behavioral1/memory/560-73-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/560-69-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
tmp.exepid process 1316 tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exepid process 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exedescription pid process target process PID 1616 set thread context of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exepid process 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exedescription pid process Token: SeDebugPrivilege 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exedescription pid process target process PID 1616 wrote to memory of 1316 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe tmp.exe PID 1616 wrote to memory of 1316 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe tmp.exe PID 1616 wrote to memory of 1316 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe tmp.exe PID 1616 wrote to memory of 1316 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe tmp.exe PID 1616 wrote to memory of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe PID 1616 wrote to memory of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe PID 1616 wrote to memory of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe PID 1616 wrote to memory of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe PID 1616 wrote to memory of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe PID 1616 wrote to memory of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe PID 1616 wrote to memory of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe PID 1616 wrote to memory of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe PID 1616 wrote to memory of 560 1616 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe 464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe"C:\Users\Admin\AppData\Local\Temp\464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exeC:\Users\Admin\AppData\Local\Temp\464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\.IdentifierFilesize
68B
MD5a0957afbc62b57c5b6694147ad4e3cbf
SHA1c08116df06d31f1e4f9781e062629787a1f9daaf
SHA256b3f3532b3b385f47a86076577178ae94d4c2a4878afb55184b6c4124b15ee59e
SHA512921d3043aac57bdc48f9fbc83a0abd9b72a6bf16bd02477635c023e7a6dd7e05af1e54b8fd982b4084c7312029b01c0ba68dcdeee65c236258b8989dc1ecd0d2
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeFilesize
81KB
MD52209d66d417cf442c1bc950abd7ad2c4
SHA1c47e7ed762573a0e1e436ed24c8a477da0721795
SHA256a15ed411a501180bfd00167f12dcbb739449eeb403b9819d53f0647b681e23f4
SHA512c63eb1fd172c0f192f05f72bf600f5193ac401ac49018a696b93145861591c9eeb7533c0b617fdec10d8543ba688c448c00b2ab7a1539e17f8662f193aca2c90
-
\Users\Admin\AppData\Local\Temp\tmp.exeFilesize
81KB
MD52209d66d417cf442c1bc950abd7ad2c4
SHA1c47e7ed762573a0e1e436ed24c8a477da0721795
SHA256a15ed411a501180bfd00167f12dcbb739449eeb403b9819d53f0647b681e23f4
SHA512c63eb1fd172c0f192f05f72bf600f5193ac401ac49018a696b93145861591c9eeb7533c0b617fdec10d8543ba688c448c00b2ab7a1539e17f8662f193aca2c90
-
\Users\Admin\AppData\Local\Temp\tmp.exeFilesize
81KB
MD52209d66d417cf442c1bc950abd7ad2c4
SHA1c47e7ed762573a0e1e436ed24c8a477da0721795
SHA256a15ed411a501180bfd00167f12dcbb739449eeb403b9819d53f0647b681e23f4
SHA512c63eb1fd172c0f192f05f72bf600f5193ac401ac49018a696b93145861591c9eeb7533c0b617fdec10d8543ba688c448c00b2ab7a1539e17f8662f193aca2c90
-
memory/560-63-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/560-62-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/560-65-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/560-67-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/560-70-0x0000000000402196-mapping.dmp
-
memory/560-73-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/560-69-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/560-75-0x0000000000401000-0x0000000000413000-memory.dmpFilesize
72KB
-
memory/1316-59-0x0000000000000000-mapping.dmp
-
memory/1616-56-0x00000000742E0000-0x000000007488B000-memory.dmpFilesize
5.7MB
-
memory/1616-54-0x0000000075C81000-0x0000000075C83000-memory.dmpFilesize
8KB
-
memory/1616-55-0x00000000742E0000-0x000000007488B000-memory.dmpFilesize
5.7MB
-
memory/1616-76-0x00000000742E0000-0x000000007488B000-memory.dmpFilesize
5.7MB