Analysis
-
max time kernel
241s -
max time network
249s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 03:40
Static task
static1
Behavioral task
behavioral1
Sample
6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe
Resource
win10v2004-20221111-en
General
-
Target
6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe
-
Size
136KB
-
MD5
2505742ae27ef7ae5d8a86b4933d39f8
-
SHA1
adee8a16bbbc686c5809ca62701b70abf58381c6
-
SHA256
6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7
-
SHA512
dd986772ecf56c3b6017f95207d851ee265196b2e00ea39e7c5a8a91fce9800ba5900ebad73ef3b54b2f5c02099e126ca8386b3499cd747c77e1ac7189cf7902
-
SSDEEP
3072:nCXSB4NcMTwxerG44kSFfOaRW4J3ELpLgE:nHBLdwAkSRv
Malware Config
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2300-140-0x0000000000000000-mapping.dmp netwire behavioral2/memory/2300-143-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2300-144-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2300-145-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
jhghf.exejhghf.exepid process 2212 jhghf.exe 2300 jhghf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jgjgjgg = "C:\\Users\\Admin\\AppData\\Roaming\\picture\\jhghf.exe" 6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exejhghf.exepid process 4832 6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe 2212 jhghf.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exejhghf.exedescription pid process target process PID 4832 wrote to memory of 2212 4832 6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe jhghf.exe PID 4832 wrote to memory of 2212 4832 6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe jhghf.exe PID 4832 wrote to memory of 2212 4832 6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe PID 2212 wrote to memory of 2300 2212 jhghf.exe jhghf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe"C:\Users\Admin\AppData\Local\Temp\6276bd7afc3908629d69b2313f2553595991e2b1e0dc2e3a425b370104caa3d7.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Roaming\picture\jhghf.exe"C:\Users\Admin\AppData\Roaming\picture\jhghf.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Roaming\picture\jhghf.exe"C:\Users\Admin\AppData\Roaming\picture\jhghf.exe"3⤵
- Executes dropped EXE
PID:2300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59a9b453461910f1832405928613740c7
SHA155f7155d2c34c0e2e87922748ed0bd0047a47016
SHA256bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1
SHA512c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194
-
Filesize
136KB
MD59a9b453461910f1832405928613740c7
SHA155f7155d2c34c0e2e87922748ed0bd0047a47016
SHA256bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1
SHA512c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194
-
Filesize
136KB
MD59a9b453461910f1832405928613740c7
SHA155f7155d2c34c0e2e87922748ed0bd0047a47016
SHA256bddb2836aa697d1c9e1e888b36b04f20cecf7e3d01bba367fb30a330843d17b1
SHA512c217bd1d913efb12e890e4e967c09f911a78754e377241b517d08765e347ed0f6922aa73330e2179400fa8a001463f7333fc172d1f95a767d6f0bd9bd4112194