Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 05:43
Static task
static1
Behavioral task
behavioral1
Sample
448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exe
Resource
win7-20220812-en
General
-
Target
448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exe
-
Size
973KB
-
MD5
02e2a53027968cb04ed45cbc0c77ba27
-
SHA1
bf08129c289b00c9e84722071eb191de9e44071e
-
SHA256
448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596
-
SHA512
a3eb3287285fa353e334b0105327250300a2219c727153fc703e6ac5d41ea3e087ed4432aff5694661aa08ce29d0b208f9091c435ea12fc3698e27bf10229cbd
-
SSDEEP
12288:lK2mhAMJ/cPlopNHvo8h7UZYE82Y5UKUL4n4y3Xp3SbSlDCnj:k2O/GlopNHv/7g6zwm4m53Sb2Dwj
Malware Config
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3640-139-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3640-141-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/3640-142-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
jqupjn.exepid process 1172 jqupjn.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y5D3T3W7-WEL0-NLI7-04U6-RM20T1YFDIN0}\StubPath = "\"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe\"" RegSvcs.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y5D3T3W7-WEL0-NLI7-04U6-RM20T1YFDIN0} RegSvcs.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
jqupjn.exeRegSvcs.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run jqupjn.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN jqupjn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run jqupjn.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ RegSvcs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe" RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce jqupjn.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\C:\Users\Admin\OH9Z1V~1 = "C:\\Users\\Admin\\OH9Z1V~1\\pmxizkozmsc.vbs" jqupjn.exe Key deleted \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN jqupjn.exe -
Processes:
jqupjn.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA jqupjn.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jqupjn.exedescription pid process target process PID 1172 set thread context of 3640 1172 jqupjn.exe RegSvcs.exe -
Drops file in Windows directory 2 IoCs
Processes:
RegSvcs.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\.Identifier RegSvcs.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\.Identifier RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
jqupjn.exepid process 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe 1172 jqupjn.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exejqupjn.exedescription pid process target process PID 432 wrote to memory of 1172 432 448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exe jqupjn.exe PID 432 wrote to memory of 1172 432 448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exe jqupjn.exe PID 432 wrote to memory of 1172 432 448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exe jqupjn.exe PID 1172 wrote to memory of 3640 1172 jqupjn.exe RegSvcs.exe PID 1172 wrote to memory of 3640 1172 jqupjn.exe RegSvcs.exe PID 1172 wrote to memory of 3640 1172 jqupjn.exe RegSvcs.exe PID 1172 wrote to memory of 3640 1172 jqupjn.exe RegSvcs.exe PID 1172 wrote to memory of 3640 1172 jqupjn.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exe"C:\Users\Admin\AppData\Local\Temp\448ad90bea1254e5759445568842b73ea15c18385abcfd53a85fcdf4afa90596.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\oh9z1vv32772i\jqupjn.exe"C:\Users\Admin\oh9z1vv32772i\jqupjn.exe" kqlfqsuvnoil2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\OH9Z1V~1\kawe.UYJFilesize
81KB
MD515c6d858c874152a8866644826b4e620
SHA1d71924a5f93df862656b3fe2a4275caf212f0b7f
SHA256538c983ae8af5ef1b7fe1b5dc50c8a3321bc310a058f05944c322ec3b0e2f417
SHA512419584f15f886c9406160e4177af7973a96e402fef30abc7a461f392573f3f680def906d00cfa0003ebe0ea4b87af509dc55ffd67e85fa1abac459874f8bd9bb
-
C:\Users\Admin\OH9Z1V~1\zvsbyzhb.LPWFilesize
146B
MD5fdf32a0a0b1f67838cfc15520531f23d
SHA15f9488b8546a4c82f602749698d6d91391a84720
SHA2560d82cbe8347654a8186e803270279c96948a0fe281563aa7f897d58b68b33e9d
SHA512f398dfe9b09ae29f23db87327a6c5f1fbac4c02efd15c9f88d913bb7c4613f59bfbc8154dddf0e58ecd9222a0e9f851f6f550194b81a4969e9e4c455974c88cd
-
C:\Users\Admin\oh9z1vv32772i\jqupjn.exeFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
C:\Users\Admin\oh9z1vv32772i\jqupjn.exeFilesize
732KB
MD571d8f6d5dc35517275bc38ebcc815f9f
SHA1cae4e8c730de5a01d30aabeb3e5cb2136090ed8d
SHA256fb73a819b37523126c7708a1d06f3b8825fa60c926154ab2d511ba668f49dc4b
SHA5124826f45000ea50d9044e3ef11e83426281fbd5f3f5a25f9786c2e487b4cf26b04f6f900ca6e70440644c9d75f700a4c908ab6f398f59c65ee1bff85dfef4ce59
-
C:\Users\Admin\oh9z1vv32772i\kqlfqsuvnoilFilesize
646.7MB
MD59086db7a54ae22dc3afd391a226f3c82
SHA158708c77cd5f5efd33495d00fd83d3d8507210ad
SHA256b483de9afeef46550d238fb854e1b747bf69bdf7f1a48d098d3662d1f5906162
SHA512d4304853e6efdb33a08f8e1dff962c17445bed08e971fc030fd798fa90af010cfba22e80b35471e11b96a2424ef8fa909d8937e00c61c856fe7e9c497153dd08
-
memory/1172-132-0x0000000000000000-mapping.dmp
-
memory/3640-138-0x0000000000000000-mapping.dmp
-
memory/3640-139-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3640-141-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3640-142-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB