Analysis
-
max time kernel
173s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:47
Static task
static1
Behavioral task
behavioral1
Sample
02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe
Resource
win10v2004-20220901-en
General
-
Target
02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe
-
Size
626KB
-
MD5
7af42f187551fa37410b77c2bfb9d8ba
-
SHA1
3e799bfb72b63f5908856fc7dd4bde5af40ca84c
-
SHA256
02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710
-
SHA512
8259b47a094eb006eea22a8a9b570f612fc811e6d847ae2a29cc4a1ad85a3fff25802657242caa1554bcac779b1c7c610287be4e73fc7d6e9f25f208feb25d7b
-
SSDEEP
12288:xJRYT/jA1+FSpwPpwHd+3anVKB7myuK0bcNb2amWsVODj:M/RF4wPid+qbyxkatFDj
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1816-58-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral1/memory/1640-68-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 1708 Host.exe 1640 Host.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{XV7NSHJ6-303K-MEHH-0C16-7258W7M0L217} Host.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{XV7NSHJ6-303K-MEHH-0C16-7258W7M0L217}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe\"" Host.exe -
Loads dropped DLL 2 IoCs
Processes:
02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exepid process 1816 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe 1816 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Host.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Host.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xnewisrto = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\Host.exe" Host.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exeHost.exedescription pid process target process PID 1232 set thread context of 1816 1232 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe PID 1708 set thread context of 1640 1708 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exeHost.exepid process 1232 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe 1232 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe 1708 Host.exe 1708 Host.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exeHost.exedescription pid process target process PID 1232 wrote to memory of 1816 1232 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe PID 1232 wrote to memory of 1816 1232 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe PID 1232 wrote to memory of 1816 1232 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe PID 1232 wrote to memory of 1816 1232 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe PID 1816 wrote to memory of 1708 1816 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe Host.exe PID 1816 wrote to memory of 1708 1816 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe Host.exe PID 1816 wrote to memory of 1708 1816 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe Host.exe PID 1816 wrote to memory of 1708 1816 02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe Host.exe PID 1708 wrote to memory of 1640 1708 Host.exe Host.exe PID 1708 wrote to memory of 1640 1708 Host.exe Host.exe PID 1708 wrote to memory of 1640 1708 Host.exe Host.exe PID 1708 wrote to memory of 1640 1708 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe"C:\Users\Admin\AppData\Local\Temp\02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe"C:\Users\Admin\AppData\Local\Temp\02dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
626KB
MD57af42f187551fa37410b77c2bfb9d8ba
SHA13e799bfb72b63f5908856fc7dd4bde5af40ca84c
SHA25602dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710
SHA5128259b47a094eb006eea22a8a9b570f612fc811e6d847ae2a29cc4a1ad85a3fff25802657242caa1554bcac779b1c7c610287be4e73fc7d6e9f25f208feb25d7b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
626KB
MD57af42f187551fa37410b77c2bfb9d8ba
SHA13e799bfb72b63f5908856fc7dd4bde5af40ca84c
SHA25602dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710
SHA5128259b47a094eb006eea22a8a9b570f612fc811e6d847ae2a29cc4a1ad85a3fff25802657242caa1554bcac779b1c7c610287be4e73fc7d6e9f25f208feb25d7b
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
626KB
MD57af42f187551fa37410b77c2bfb9d8ba
SHA13e799bfb72b63f5908856fc7dd4bde5af40ca84c
SHA25602dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710
SHA5128259b47a094eb006eea22a8a9b570f612fc811e6d847ae2a29cc4a1ad85a3fff25802657242caa1554bcac779b1c7c610287be4e73fc7d6e9f25f208feb25d7b
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
626KB
MD57af42f187551fa37410b77c2bfb9d8ba
SHA13e799bfb72b63f5908856fc7dd4bde5af40ca84c
SHA25602dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710
SHA5128259b47a094eb006eea22a8a9b570f612fc811e6d847ae2a29cc4a1ad85a3fff25802657242caa1554bcac779b1c7c610287be4e73fc7d6e9f25f208feb25d7b
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
626KB
MD57af42f187551fa37410b77c2bfb9d8ba
SHA13e799bfb72b63f5908856fc7dd4bde5af40ca84c
SHA25602dde7041a6f4581cef09b30c2019fad50c71bbdf9e7cda527a18a228bd48710
SHA5128259b47a094eb006eea22a8a9b570f612fc811e6d847ae2a29cc4a1ad85a3fff25802657242caa1554bcac779b1c7c610287be4e73fc7d6e9f25f208feb25d7b
-
memory/1232-54-0x0000000076041000-0x0000000076043000-memory.dmpFilesize
8KB
-
memory/1232-56-0x0000000000290000-0x0000000000295000-memory.dmpFilesize
20KB
-
memory/1640-65-0x0000000000401F8F-mapping.dmp
-
memory/1640-68-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1708-61-0x0000000000000000-mapping.dmp
-
memory/1816-55-0x0000000000401F8F-mapping.dmp
-
memory/1816-58-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB