Analysis
-
max time kernel
170s -
max time network
214s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 08:39
Static task
static1
Behavioral task
behavioral1
Sample
e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe
Resource
win7-20221111-en
General
-
Target
e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe
-
Size
1.1MB
-
MD5
580f1b384fe4aa7646a51775c2521a1b
-
SHA1
092dd20627d03b35064ddc8381be9c63dbdbac57
-
SHA256
e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8
-
SHA512
3374b1d0fe89aff7fcc3c105f73eda716330f7024f0b616fa44171e6e70cd7dc168a6558cd8c57cac7a59835f2d2c7973608cf134a79168fe4890cb64a0042ef
-
SSDEEP
12288:ljy055i/LxmIx+Nmd+Qg+0Xi5qE2lTyG9tl:PwxmIx+Nmcxty4E20Gt
Malware Config
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\tmp.exe netwire \Users\Admin\AppData\Local\Temp\tmp.exe netwire C:\Users\Admin\AppData\Local\Temp\tmp.exe netwire behavioral1/memory/1968-70-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1968-73-0x0000000000402196-mapping.dmp netwire behavioral1/memory/1968-72-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/1968-76-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 1 IoCs
Processes:
tmp.exepid process 856 tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exepid process 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exedescription pid process target process PID 524 set thread context of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exepid process 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exedescription pid process Token: SeDebugPrivilege 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.execmd.exedescription pid process target process PID 524 wrote to memory of 932 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe cmd.exe PID 524 wrote to memory of 932 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe cmd.exe PID 524 wrote to memory of 932 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe cmd.exe PID 524 wrote to memory of 932 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe cmd.exe PID 932 wrote to memory of 1924 932 cmd.exe wscript.exe PID 932 wrote to memory of 1924 932 cmd.exe wscript.exe PID 932 wrote to memory of 1924 932 cmd.exe wscript.exe PID 932 wrote to memory of 1924 932 cmd.exe wscript.exe PID 524 wrote to memory of 856 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe tmp.exe PID 524 wrote to memory of 856 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe tmp.exe PID 524 wrote to memory of 856 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe tmp.exe PID 524 wrote to memory of 856 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe tmp.exe PID 524 wrote to memory of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe PID 524 wrote to memory of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe PID 524 wrote to memory of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe PID 524 wrote to memory of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe PID 524 wrote to memory of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe PID 524 wrote to memory of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe PID 524 wrote to memory of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe PID 524 wrote to memory of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe PID 524 wrote to memory of 1968 524 e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe"C:\Users\Admin\AppData\Local\Temp\e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f\1.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exewscript.exe "C:\Users\Admin\AppData\Local\Temp\f\vbs.vbs" "C:\Users\Admin\AppData\Local\Temp\f\2.bat"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exeC:\Users\Admin\AppData\Local\Temp\e9453c2bb2511fbb6e9e0d27beeddb5602f08cddd26022b36e756ecd3edfd0c8.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\.IdentifierFilesize
68B
MD5a2ead345ab5a951a2a0432a1856590f8
SHA15274cb4d22843ca4a31134f5c59a85baf4599b80
SHA256a07ae94cbe7f4c79da91558dc1db9f5d836a3ab4b1a5b72ff297a0015b5d2751
SHA512d28d743efcf07e46b813a4383e9de146d9461d313b1795a011177fb81b3486bd537da1953bfb0acd5b49b8b83bc9ecac7c7297f36e024b47b5290d0ce1eb9356
-
C:\Users\Admin\AppData\Local\Temp\f\1.batFilesize
47B
MD5624373df2461660386e47113698fab32
SHA16f920b7128ef24a2e2da251cb1462d49bf275dc8
SHA256e00ac04f41983738840e5ca1d6946e03f23eaa788d0f7eeea6ed992b30900558
SHA512e794d05bd44bce25e877efb1a187af564a9de7f19458f6032f2ca8e8725b9d0c8e42b4c7ceb93e22367c61fd1ce9c8807b03da61982783c4400123f8d6dcdfa3
-
C:\Users\Admin\AppData\Local\Temp\f\vbs.vbsFilesize
78B
MD5c578d9653b22800c3eb6b6a51219bbb8
SHA1a97aa251901bbe179a48dbc7a0c1872e163b1f2d
SHA25620a98a7e6e137bb1b9bd5ef6911a479cb8eac925b80d6db4e70b19f62a40cce2
SHA5123ae6dc8f02d1a78e1235a0782b632972da5a74ab32287cc41aa672d4fa4a9d34bb5fc50eba07b6915f2e61c402927cd5f6feeb7f7602afa2f64e91efb3b7fc4d
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeFilesize
81KB
MD54b42a02bc2d4ce5833a8750147b7a942
SHA1a295ed74276421bf1fc675e3176c9a77e2dc4bde
SHA2568f05e2a0ef9331ff2f7aee2fb054d6aee363abd55f25f7a99883fb2045183646
SHA512a72317ef36853c79776d1b322b812ab9d25649fbd73b7d8aeb71f741bfca192d8df293ff72ce855c86b8062cc07f5cc1571984fdec226fb9f51de690cde0d8bf
-
\Users\Admin\AppData\Local\Temp\tmp.exeFilesize
81KB
MD54b42a02bc2d4ce5833a8750147b7a942
SHA1a295ed74276421bf1fc675e3176c9a77e2dc4bde
SHA2568f05e2a0ef9331ff2f7aee2fb054d6aee363abd55f25f7a99883fb2045183646
SHA512a72317ef36853c79776d1b322b812ab9d25649fbd73b7d8aeb71f741bfca192d8df293ff72ce855c86b8062cc07f5cc1571984fdec226fb9f51de690cde0d8bf
-
\Users\Admin\AppData\Local\Temp\tmp.exeFilesize
81KB
MD54b42a02bc2d4ce5833a8750147b7a942
SHA1a295ed74276421bf1fc675e3176c9a77e2dc4bde
SHA2568f05e2a0ef9331ff2f7aee2fb054d6aee363abd55f25f7a99883fb2045183646
SHA512a72317ef36853c79776d1b322b812ab9d25649fbd73b7d8aeb71f741bfca192d8df293ff72ce855c86b8062cc07f5cc1571984fdec226fb9f51de690cde0d8bf
-
memory/524-55-0x0000000074040000-0x00000000745EB000-memory.dmpFilesize
5.7MB
-
memory/524-54-0x0000000074F01000-0x0000000074F03000-memory.dmpFilesize
8KB
-
memory/524-80-0x0000000074040000-0x00000000745EB000-memory.dmpFilesize
5.7MB
-
memory/856-61-0x0000000000000000-mapping.dmp
-
memory/932-56-0x0000000000000000-mapping.dmp
-
memory/1924-58-0x0000000000000000-mapping.dmp
-
memory/1968-65-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1968-70-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1968-73-0x0000000000402196-mapping.dmp
-
memory/1968-72-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1968-76-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1968-68-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1968-78-0x0000000000401000-0x0000000000413000-memory.dmpFilesize
72KB
-
memory/1968-66-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB