Analysis
-
max time kernel
166s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 04:26
Static task
static1
Behavioral task
behavioral1
Sample
15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe
Resource
win10v2004-20220812-en
General
-
Target
15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe
-
Size
132KB
-
MD5
800bf6030c855beff04c828405712a71
-
SHA1
3ace3a76b0d05e3667568997a73ce1264a25fb93
-
SHA256
15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1
-
SHA512
1731114cecbc465b0365d6a1f8f4afc918cd7aa401241f844efbbf3219f54505e1eca53d70d88620c199abbca377e87636666cae608d6cb77fca66bf0d767669
-
SSDEEP
3072:kDQkrZoosbIfXJvWaZkPZqnCQE4L6AAcMIKAhlz0sjLJFH:kDpoeUdqCQE26A/dKAj7zH
Malware Config
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4276-142-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral2/memory/4940-152-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral2/memory/4940-153-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
wiki.exewiki.exepid process 3872 wiki.exe 4940 wiki.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
wiki.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0K7Q8LQH-HB2E-7PTW-8VM5-0W07716742YI} wiki.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0K7Q8LQH-HB2E-7PTW-8VM5-0W07716742YI}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Wikimedia\\wiki.exe\"" wiki.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe -
Loads dropped DLL 4 IoCs
Processes:
15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exewiki.exepid process 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 3872 wiki.exe 3872 wiki.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wiki.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ wiki.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Chrome = "C:\\Users\\Admin\\AppData\\Roaming\\Wikimedia\\wiki.exe" wiki.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exewiki.exedescription pid process target process PID 2480 set thread context of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 3872 set thread context of 4940 3872 wiki.exe wiki.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe nsis_installer_2 -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exewiki.exedescription pid process target process PID 2480 wrote to memory of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 2480 wrote to memory of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 2480 wrote to memory of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 2480 wrote to memory of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 2480 wrote to memory of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 2480 wrote to memory of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 2480 wrote to memory of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 2480 wrote to memory of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 2480 wrote to memory of 4276 2480 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe PID 4276 wrote to memory of 3872 4276 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe wiki.exe PID 4276 wrote to memory of 3872 4276 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe wiki.exe PID 4276 wrote to memory of 3872 4276 15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe wiki.exe PID 3872 wrote to memory of 4940 3872 wiki.exe wiki.exe PID 3872 wrote to memory of 4940 3872 wiki.exe wiki.exe PID 3872 wrote to memory of 4940 3872 wiki.exe wiki.exe PID 3872 wrote to memory of 4940 3872 wiki.exe wiki.exe PID 3872 wrote to memory of 4940 3872 wiki.exe wiki.exe PID 3872 wrote to memory of 4940 3872 wiki.exe wiki.exe PID 3872 wrote to memory of 4940 3872 wiki.exe wiki.exe PID 3872 wrote to memory of 4940 3872 wiki.exe wiki.exe PID 3872 wrote to memory of 4940 3872 wiki.exe wiki.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe"C:\Users\Admin\AppData\Local\Temp\15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe"C:\Users\Admin\AppData\Local\Temp\15d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe"C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe"C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\love\contacting.qseMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\nsp7E1.tmp\testing.dllFilesize
51KB
MD54563d7119d2e58de0c9aada9c03938fc
SHA1a038b5f4dc93a0b256c6702c9470f394b6579fa8
SHA2562fffeee4c47f621b2b90aad074f294d959a9c986d8010b99aebd8e7168c385fc
SHA5124c0ebadaea096774ac1821091d77c23599d9100478d755e888a990ec0b2e64cf3113ef0a515d05b3e33fd7221593be197c0bdfa95f39fa2daad93d561d7911fd
-
C:\Users\Admin\AppData\Local\Temp\nsp7E1.tmp\testing.dllFilesize
51KB
MD54563d7119d2e58de0c9aada9c03938fc
SHA1a038b5f4dc93a0b256c6702c9470f394b6579fa8
SHA2562fffeee4c47f621b2b90aad074f294d959a9c986d8010b99aebd8e7168c385fc
SHA5124c0ebadaea096774ac1821091d77c23599d9100478d755e888a990ec0b2e64cf3113ef0a515d05b3e33fd7221593be197c0bdfa95f39fa2daad93d561d7911fd
-
C:\Users\Admin\AppData\Local\Temp\nswFDC0.tmp\testing.dllFilesize
51KB
MD54563d7119d2e58de0c9aada9c03938fc
SHA1a038b5f4dc93a0b256c6702c9470f394b6579fa8
SHA2562fffeee4c47f621b2b90aad074f294d959a9c986d8010b99aebd8e7168c385fc
SHA5124c0ebadaea096774ac1821091d77c23599d9100478d755e888a990ec0b2e64cf3113ef0a515d05b3e33fd7221593be197c0bdfa95f39fa2daad93d561d7911fd
-
C:\Users\Admin\AppData\Local\Temp\nswFDC0.tmp\testing.dllFilesize
51KB
MD54563d7119d2e58de0c9aada9c03938fc
SHA1a038b5f4dc93a0b256c6702c9470f394b6579fa8
SHA2562fffeee4c47f621b2b90aad074f294d959a9c986d8010b99aebd8e7168c385fc
SHA5124c0ebadaea096774ac1821091d77c23599d9100478d755e888a990ec0b2e64cf3113ef0a515d05b3e33fd7221593be197c0bdfa95f39fa2daad93d561d7911fd
-
C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exeFilesize
132KB
MD5800bf6030c855beff04c828405712a71
SHA13ace3a76b0d05e3667568997a73ce1264a25fb93
SHA25615d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1
SHA5121731114cecbc465b0365d6a1f8f4afc918cd7aa401241f844efbbf3219f54505e1eca53d70d88620c199abbca377e87636666cae608d6cb77fca66bf0d767669
-
C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exeFilesize
132KB
MD5800bf6030c855beff04c828405712a71
SHA13ace3a76b0d05e3667568997a73ce1264a25fb93
SHA25615d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1
SHA5121731114cecbc465b0365d6a1f8f4afc918cd7aa401241f844efbbf3219f54505e1eca53d70d88620c199abbca377e87636666cae608d6cb77fca66bf0d767669
-
C:\Users\Admin\AppData\Roaming\Wikimedia\wiki.exeFilesize
132KB
MD5800bf6030c855beff04c828405712a71
SHA13ace3a76b0d05e3667568997a73ce1264a25fb93
SHA25615d996fe436dc316a84767c8672e8164706d44468381eda35988ea4ebee9deb1
SHA5121731114cecbc465b0365d6a1f8f4afc918cd7aa401241f844efbbf3219f54505e1eca53d70d88620c199abbca377e87636666cae608d6cb77fca66bf0d767669
-
memory/2480-134-0x0000000002140000-0x0000000002155000-memory.dmpFilesize
84KB
-
memory/3872-139-0x0000000000000000-mapping.dmp
-
memory/3872-146-0x0000000002150000-0x0000000002165000-memory.dmpFilesize
84KB
-
memory/4276-138-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/4276-142-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/4276-136-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/4276-135-0x0000000000000000-mapping.dmp
-
memory/4940-147-0x0000000000000000-mapping.dmp
-
memory/4940-152-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/4940-153-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB