Analysis
-
max time kernel
149s -
max time network
184s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 23:19
Static task
static1
Behavioral task
behavioral1
Sample
f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe
Resource
win10v2004-20220901-en
General
-
Target
f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe
-
Size
875KB
-
MD5
9e31a336dd9e73df1cabf3d3b8e3d489
-
SHA1
349253da2192e6c146631bbf9566d06430b015bf
-
SHA256
f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d
-
SHA512
0e25b7ada6d67c4c98a4105c959b6888adda10fe123f35d720364ccb361efa5ca8e863700ee9aaa86bd3536306396ec13fa61d2885ff8f84957e85a11a9ba6cd
-
SSDEEP
12288:caWzgMg7v3qnCiMErQohh0F4CCJ8lny/QswI0+u0DrvssN8q:jaHMv6Corjqny/QNI0+VXssKq
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1340-69-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral1/memory/2032-84-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1708 Host.exe 2032 Host.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{XTV2TOCI-0048-CP6U-0UC5-5FV14W0LO46U} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{XTV2TOCI-0048-CP6U-0UC5-5FV14W0LO46U}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Loads dropped DLL 1 IoCs
Processes:
f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exepid process 1340 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe C:\Users\Admin\AppData\Roaming\Install\Host.exe autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exeHost.exedescription pid process target process PID 1536 set thread context of 1340 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe PID 1708 set thread context of 2032 1708 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exeHost.exepid process 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe 1708 Host.exe 1708 Host.exe 1708 Host.exe -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exeHost.exepid process 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe 1708 Host.exe 1708 Host.exe 1708 Host.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exef176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exeHost.exedescription pid process target process PID 1536 wrote to memory of 1340 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe PID 1536 wrote to memory of 1340 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe PID 1536 wrote to memory of 1340 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe PID 1536 wrote to memory of 1340 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe PID 1536 wrote to memory of 1340 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe PID 1536 wrote to memory of 1340 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe PID 1536 wrote to memory of 1340 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe PID 1536 wrote to memory of 1340 1536 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe PID 1340 wrote to memory of 1708 1340 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe Host.exe PID 1340 wrote to memory of 1708 1340 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe Host.exe PID 1340 wrote to memory of 1708 1340 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe Host.exe PID 1340 wrote to memory of 1708 1340 f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe Host.exe PID 1708 wrote to memory of 2032 1708 Host.exe Host.exe PID 1708 wrote to memory of 2032 1708 Host.exe Host.exe PID 1708 wrote to memory of 2032 1708 Host.exe Host.exe PID 1708 wrote to memory of 2032 1708 Host.exe Host.exe PID 1708 wrote to memory of 2032 1708 Host.exe Host.exe PID 1708 wrote to memory of 2032 1708 Host.exe Host.exe PID 1708 wrote to memory of 2032 1708 Host.exe Host.exe PID 1708 wrote to memory of 2032 1708 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe"C:\Users\Admin\AppData\Local\Temp\f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe"C:\Users\Admin\AppData\Local\Temp\f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe" -m C:\Users\Admin\AppData\Local\Temp\f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
875KB
MD59e31a336dd9e73df1cabf3d3b8e3d489
SHA1349253da2192e6c146631bbf9566d06430b015bf
SHA256f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d
SHA5120e25b7ada6d67c4c98a4105c959b6888adda10fe123f35d720364ccb361efa5ca8e863700ee9aaa86bd3536306396ec13fa61d2885ff8f84957e85a11a9ba6cd
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
875KB
MD59e31a336dd9e73df1cabf3d3b8e3d489
SHA1349253da2192e6c146631bbf9566d06430b015bf
SHA256f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d
SHA5120e25b7ada6d67c4c98a4105c959b6888adda10fe123f35d720364ccb361efa5ca8e863700ee9aaa86bd3536306396ec13fa61d2885ff8f84957e85a11a9ba6cd
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
875KB
MD59e31a336dd9e73df1cabf3d3b8e3d489
SHA1349253da2192e6c146631bbf9566d06430b015bf
SHA256f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d
SHA5120e25b7ada6d67c4c98a4105c959b6888adda10fe123f35d720364ccb361efa5ca8e863700ee9aaa86bd3536306396ec13fa61d2885ff8f84957e85a11a9ba6cd
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
875KB
MD59e31a336dd9e73df1cabf3d3b8e3d489
SHA1349253da2192e6c146631bbf9566d06430b015bf
SHA256f176551008ead792dc4d981c0b1c2ad48f3f2bab30fb76fb62264c096f11739d
SHA5120e25b7ada6d67c4c98a4105c959b6888adda10fe123f35d720364ccb361efa5ca8e863700ee9aaa86bd3536306396ec13fa61d2885ff8f84957e85a11a9ba6cd
-
memory/1340-60-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1340-62-0x0000000000401F8F-mapping.dmp
-
memory/1340-61-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1340-65-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1340-69-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1340-55-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1340-58-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1340-56-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1536-54-0x0000000075CF1000-0x0000000075CF3000-memory.dmpFilesize
8KB
-
memory/1708-67-0x0000000000000000-mapping.dmp
-
memory/2032-79-0x0000000000401F8F-mapping.dmp
-
memory/2032-84-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB