Analysis
-
max time kernel
150s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 10:51
Static task
static1
Behavioral task
behavioral1
Sample
b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe
Resource
win10v2004-20220812-en
General
-
Target
b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe
-
Size
462KB
-
MD5
b8f12deba5ed8696877ca4dd96fe16b8
-
SHA1
23a996e70f7154d9ca4fc3d708ee024493acc4a1
-
SHA256
b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1
-
SHA512
84dc9c09b9cc03f6cccfcd2965fec88fdcad4926bb91be71c21566986cfc140bdc698dfda8ff7960aef4518563336f2dad962e5e29d25fd7223d2950081f7b26
-
SSDEEP
12288:4BFq3hrSEGkejhVatW+bbSzQSNtvzsjfY942d:463hrSEGkejhWW+bbMX/sjfw42d
Malware Config
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2356-140-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral2/memory/2316-148-0x0000000000000000-mapping.dmp netwire behavioral2/memory/2316-153-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
intelcp.exeintelcp.exepid process 524 intelcp.exe 2316 intelcp.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
intelcp.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0DRN2S13-48SS-6811-08N8-O5TPE7F4Y5MU} intelcp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0DRN2S13-48SS-6811-08N8-O5TPE7F4Y5MU}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Intel\\intelcp.exe\"" intelcp.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exeb638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exeintelcp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation intelcp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
intelcp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ intelcp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Intel Control = "C:\\Users\\Admin\\AppData\\Roaming\\Intel\\intelcp.exe" intelcp.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exeintelcp.exedescription pid process target process PID 4184 set thread context of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 524 set thread context of 2316 524 intelcp.exe intelcp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exeintelcp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings intelcp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 116 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 116 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AUDIODG.EXEvlc.exedescription pid process Token: 33 4432 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4432 AUDIODG.EXE Token: 33 116 vlc.exe Token: SeIncBasePriorityPrivilege 116 vlc.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
Processes:
vlc.exepid process 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
vlc.exepid process 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe 116 vlc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exeintelcp.exevlc.exepid process 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe 524 intelcp.exe 116 vlc.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exeb638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exeintelcp.exedescription pid process target process PID 4184 wrote to memory of 116 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe vlc.exe PID 4184 wrote to memory of 116 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe vlc.exe PID 4184 wrote to memory of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 4184 wrote to memory of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 4184 wrote to memory of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 4184 wrote to memory of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 4184 wrote to memory of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 4184 wrote to memory of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 4184 wrote to memory of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 4184 wrote to memory of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 4184 wrote to memory of 2356 4184 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe PID 2356 wrote to memory of 524 2356 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe intelcp.exe PID 2356 wrote to memory of 524 2356 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe intelcp.exe PID 2356 wrote to memory of 524 2356 b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe intelcp.exe PID 524 wrote to memory of 4052 524 intelcp.exe vlc.exe PID 524 wrote to memory of 4052 524 intelcp.exe vlc.exe PID 524 wrote to memory of 2316 524 intelcp.exe intelcp.exe PID 524 wrote to memory of 2316 524 intelcp.exe intelcp.exe PID 524 wrote to memory of 2316 524 intelcp.exe intelcp.exe PID 524 wrote to memory of 2316 524 intelcp.exe intelcp.exe PID 524 wrote to memory of 2316 524 intelcp.exe intelcp.exe PID 524 wrote to memory of 2316 524 intelcp.exe intelcp.exe PID 524 wrote to memory of 2316 524 intelcp.exe intelcp.exe PID 524 wrote to memory of 2316 524 intelcp.exe intelcp.exe PID 524 wrote to memory of 2316 524 intelcp.exe intelcp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe"C:\Users\Admin\AppData\Local\Temp\b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\voicemail.mp3"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe"C:\Users\Admin\AppData\Local\Temp\b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Intel\intelcp.exe"C:\Users\Admin\AppData\Roaming\Intel\intelcp.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\voicemail.mp3"4⤵
-
C:\Users\Admin\AppData\Roaming\Intel\intelcp.exe"C:\Users\Admin\AppData\Roaming\Intel\intelcp.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3cc 0x4c01⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\voicemail.mp3Filesize
327KB
MD50b9fc618adcd45ab7da9927b660047a8
SHA1c794f0acfc8aa3a5cc66cfcdbebdacf404c0574c
SHA2565098cf2e58b8b1bcb786de56490d0e4598323edb5fafb08fce2ce4b2f3b26618
SHA512b9ec70e4620e00b380c5dc3d8069bd7e698c9452f4bcdc471d2a90070855f8762d994588d2a1938dd2df51d6109fb5577247a357f48a97a396ef9127df2512c7
-
C:\Users\Admin\AppData\Roaming\Intel\intelcp.exeFilesize
462KB
MD5b8f12deba5ed8696877ca4dd96fe16b8
SHA123a996e70f7154d9ca4fc3d708ee024493acc4a1
SHA256b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1
SHA51284dc9c09b9cc03f6cccfcd2965fec88fdcad4926bb91be71c21566986cfc140bdc698dfda8ff7960aef4518563336f2dad962e5e29d25fd7223d2950081f7b26
-
C:\Users\Admin\AppData\Roaming\Intel\intelcp.exeFilesize
462KB
MD5b8f12deba5ed8696877ca4dd96fe16b8
SHA123a996e70f7154d9ca4fc3d708ee024493acc4a1
SHA256b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1
SHA51284dc9c09b9cc03f6cccfcd2965fec88fdcad4926bb91be71c21566986cfc140bdc698dfda8ff7960aef4518563336f2dad962e5e29d25fd7223d2950081f7b26
-
C:\Users\Admin\AppData\Roaming\Intel\intelcp.exeFilesize
462KB
MD5b8f12deba5ed8696877ca4dd96fe16b8
SHA123a996e70f7154d9ca4fc3d708ee024493acc4a1
SHA256b638c1388498bf3e0e078ae3961dbc878d36c9f1298992d38603941dfb018fc1
SHA51284dc9c09b9cc03f6cccfcd2965fec88fdcad4926bb91be71c21566986cfc140bdc698dfda8ff7960aef4518563336f2dad962e5e29d25fd7223d2950081f7b26
-
memory/116-135-0x0000000000000000-mapping.dmp
-
memory/524-141-0x0000000000000000-mapping.dmp
-
memory/2316-148-0x0000000000000000-mapping.dmp
-
memory/2316-153-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2356-140-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2356-139-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2356-137-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/2356-136-0x0000000000000000-mapping.dmp
-
memory/4052-147-0x0000000000000000-mapping.dmp
-
memory/4184-134-0x00000000023E0000-0x00000000023E6000-memory.dmpFilesize
24KB