Analysis
-
max time kernel
206s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 14:38
Static task
static1
Behavioral task
behavioral1
Sample
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe
Resource
win7-20221111-en
General
-
Target
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe
-
Size
322KB
-
MD5
8c6786529c56bfe3802712e393a13e4c
-
SHA1
e88851e8fb9b948911616d4fad67e3f4b7b970af
-
SHA256
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4
-
SHA512
769a5434ebc6079dbd9d056e6b31d1bcc7338bb209e376b6b02d85476348e9fff8d098c5dbdea9eb11e26d09ed6b2f619198aa1c02c68732a0bf29be6e21f46d
-
SSDEEP
3072:is9Poak1p9oc77gB2Iz3p2j1abSHLTXaUjxTsqu7oDE7wuTJOu:3PoDj9/EBnUpPXFBZl4Jl
Malware Config
Signatures
-
NetWire RAT payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2716-135-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2716-137-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral2/memory/2716-141-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Processes:
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe -
Executes dropped EXE 3 IoCs
Processes:
AppMgnt.exehknswc.exeAppMgnt.exepid process 3140 AppMgnt.exe 4396 hknswc.exe 3396 AppMgnt.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exeAppMgnt.exehknswc.exeAppMgnt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation AppMgnt.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation hknswc.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation AppMgnt.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe File opened for modification C:\Windows\assembly\Desktop.ini 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\.Identifier svchost.exe File opened for modification C:\Windows\SysWOW64\.Identifier svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exehknswc.exedescription pid process target process PID 2792 set thread context of 2716 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe svchost.exe PID 4396 set thread context of 1412 4396 hknswc.exe svchost.exe -
Drops file in Windows directory 3 IoCs
Processes:
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exedescription ioc process File opened for modification C:\Windows\assembly 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe File created C:\Windows\assembly\Desktop.ini 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe File opened for modification C:\Windows\assembly\Desktop.ini 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4964 schtasks.exe 2508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exeAppMgnt.exehknswc.exeAppMgnt.exepid process 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 3140 AppMgnt.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 3140 AppMgnt.exe 3140 AppMgnt.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 3140 AppMgnt.exe 3140 AppMgnt.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 3140 AppMgnt.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 3140 AppMgnt.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 3140 AppMgnt.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 3140 AppMgnt.exe 3140 AppMgnt.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe 3140 AppMgnt.exe 4396 hknswc.exe 4396 hknswc.exe 4396 hknswc.exe 4396 hknswc.exe 4396 hknswc.exe 4396 hknswc.exe 4396 hknswc.exe 4396 hknswc.exe 3396 AppMgnt.exe 4396 hknswc.exe 3396 AppMgnt.exe 4396 hknswc.exe 3396 AppMgnt.exe 4396 hknswc.exe 3396 AppMgnt.exe 4396 hknswc.exe 3396 AppMgnt.exe 4396 hknswc.exe 3396 AppMgnt.exe 4396 hknswc.exe 3396 AppMgnt.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exeAppMgnt.exehknswc.exeAppMgnt.exedescription pid process Token: SeDebugPrivilege 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe Token: SeDebugPrivilege 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe Token: SeDebugPrivilege 3140 AppMgnt.exe Token: SeDebugPrivilege 4396 hknswc.exe Token: SeDebugPrivilege 3396 AppMgnt.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exeAppMgnt.exehknswc.exeAppMgnt.exedescription pid process target process PID 2792 wrote to memory of 2716 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe svchost.exe PID 2792 wrote to memory of 2716 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe svchost.exe PID 2792 wrote to memory of 2716 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe svchost.exe PID 2792 wrote to memory of 2716 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe svchost.exe PID 2792 wrote to memory of 2716 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe svchost.exe PID 2792 wrote to memory of 2716 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe svchost.exe PID 2792 wrote to memory of 2716 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe svchost.exe PID 2792 wrote to memory of 2716 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe svchost.exe PID 2792 wrote to memory of 3140 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe AppMgnt.exe PID 2792 wrote to memory of 3140 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe AppMgnt.exe PID 2792 wrote to memory of 3140 2792 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe AppMgnt.exe PID 3140 wrote to memory of 2508 3140 AppMgnt.exe schtasks.exe PID 3140 wrote to memory of 2508 3140 AppMgnt.exe schtasks.exe PID 3140 wrote to memory of 2508 3140 AppMgnt.exe schtasks.exe PID 3140 wrote to memory of 4396 3140 AppMgnt.exe hknswc.exe PID 3140 wrote to memory of 4396 3140 AppMgnt.exe hknswc.exe PID 3140 wrote to memory of 4396 3140 AppMgnt.exe hknswc.exe PID 4396 wrote to memory of 1412 4396 hknswc.exe svchost.exe PID 4396 wrote to memory of 1412 4396 hknswc.exe svchost.exe PID 4396 wrote to memory of 1412 4396 hknswc.exe svchost.exe PID 4396 wrote to memory of 1412 4396 hknswc.exe svchost.exe PID 4396 wrote to memory of 1412 4396 hknswc.exe svchost.exe PID 4396 wrote to memory of 1412 4396 hknswc.exe svchost.exe PID 4396 wrote to memory of 1412 4396 hknswc.exe svchost.exe PID 4396 wrote to memory of 1412 4396 hknswc.exe svchost.exe PID 4396 wrote to memory of 3396 4396 hknswc.exe AppMgnt.exe PID 4396 wrote to memory of 3396 4396 hknswc.exe AppMgnt.exe PID 4396 wrote to memory of 3396 4396 hknswc.exe AppMgnt.exe PID 3396 wrote to memory of 4964 3396 AppMgnt.exe schtasks.exe PID 3396 wrote to memory of 4964 3396 AppMgnt.exe schtasks.exe PID 3396 wrote to memory of 4964 3396 AppMgnt.exe schtasks.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe"C:\Users\Admin\AppData\Local\Temp\823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4.exe"1⤵
- UAC bypass
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Drops file in System32 directory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC ONLOGON /TN PolicyManager /TR C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe /RL HIGHEST3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /SC ONLOGON /TN PolicyManager /TR C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exe /RL HIGHEST5⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\AppMgnt.exe.logFilesize
404B
MD5fcc802ed7e1aa47a9e0ba0420dac1632
SHA1f7a7b06f14790b2e33a66fa6c318f940a6637786
SHA256676475b51aec5bc3cbd324aca7091e8e63465b0cc77d85a02db484754c4fa7e1
SHA512df8e129fb26cc87e3f76f69c7bf142116762cfe0377599f353cb2230a3ad992ad358ddba2c46a02e1bb14e4054f3df19b028a6a44699584f2a7f9f4c53092c43
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exeFilesize
9KB
MD5377b246a502bff19611c046bc4b9528a
SHA1c33004ffce509610657ee50a942fbac7c085487e
SHA256a82131e63d829ab1a4c284069a707a25aba0c0f5f372e5e70a3d824db6b19648
SHA5129794a02ef553adf0ec48566c25abf6d327040476155102a4e934984c0529fd9e6b85b019756a166d5490aad9eb03dfd65144be590717430e9102a907158d81d3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exeFilesize
9KB
MD5377b246a502bff19611c046bc4b9528a
SHA1c33004ffce509610657ee50a942fbac7c085487e
SHA256a82131e63d829ab1a4c284069a707a25aba0c0f5f372e5e70a3d824db6b19648
SHA5129794a02ef553adf0ec48566c25abf6d327040476155102a4e934984c0529fd9e6b85b019756a166d5490aad9eb03dfd65144be590717430e9102a907158d81d3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AppMgnt.exeFilesize
9KB
MD5377b246a502bff19611c046bc4b9528a
SHA1c33004ffce509610657ee50a942fbac7c085487e
SHA256a82131e63d829ab1a4c284069a707a25aba0c0f5f372e5e70a3d824db6b19648
SHA5129794a02ef553adf0ec48566c25abf6d327040476155102a4e934984c0529fd9e6b85b019756a166d5490aad9eb03dfd65144be590717430e9102a907158d81d3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exeFilesize
322KB
MD58c6786529c56bfe3802712e393a13e4c
SHA1e88851e8fb9b948911616d4fad67e3f4b7b970af
SHA256823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4
SHA512769a5434ebc6079dbd9d056e6b31d1bcc7338bb209e376b6b02d85476348e9fff8d098c5dbdea9eb11e26d09ed6b2f619198aa1c02c68732a0bf29be6e21f46d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\hknswc.exeFilesize
322KB
MD58c6786529c56bfe3802712e393a13e4c
SHA1e88851e8fb9b948911616d4fad67e3f4b7b970af
SHA256823af0190dc3ae5d1952000b7f47e920472e1451b3f38441656f0c3e8ce6cbb4
SHA512769a5434ebc6079dbd9d056e6b31d1bcc7338bb209e376b6b02d85476348e9fff8d098c5dbdea9eb11e26d09ed6b2f619198aa1c02c68732a0bf29be6e21f46d
-
memory/1412-151-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1412-150-0x0000000000000000-mapping.dmp
-
memory/2508-145-0x0000000000000000-mapping.dmp
-
memory/2716-141-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2716-137-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2716-135-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2716-134-0x0000000000000000-mapping.dmp
-
memory/2792-154-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/2792-133-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/2792-132-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/3140-138-0x0000000000000000-mapping.dmp
-
memory/3140-143-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/3140-142-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/3140-153-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/3396-155-0x0000000000000000-mapping.dmp
-
memory/3396-160-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/3396-159-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/4396-148-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/4396-146-0x0000000000000000-mapping.dmp
-
memory/4396-149-0x0000000074EA0000-0x0000000075451000-memory.dmpFilesize
5.7MB
-
memory/4964-158-0x0000000000000000-mapping.dmp