Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 13:11
Static task
static1
Behavioral task
behavioral1
Sample
bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe
Resource
win7-20220812-en
General
-
Target
bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe
-
Size
447KB
-
MD5
754411f368178a09f54d05158e7e17a3
-
SHA1
b781c408c69827af768eeca418f564e14eaf5eaf
-
SHA256
bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651
-
SHA512
5d2083dbfc24efa11608ba443a8f2468685a11bda1502fed1c2774e737d64813f26723d8c8d16904cfe616746ad167b34c5c50936faf516934b6bcab113f8c7a
-
SSDEEP
6144:Wjjf/HVuwmguK4Fsz+XqfwXmP/R8evOYVw:WX1uJeu6fYg8evOYVw
Malware Config
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2004-62-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2004-65-0x0000000000402196-mapping.dmp netwire behavioral1/memory/2004-64-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2004-68-0x0000000000400000-0x000000000041E000-memory.dmp netwire behavioral1/memory/2004-69-0x0000000000400000-0x000000000041E000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
BrokerInfrastructure.exeAudioEndpointBuilder.exepid process 1100 BrokerInfrastructure.exe 944 AudioEndpointBuilder.exe -
Loads dropped DLL 2 IoCs
Processes:
bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exeBrokerInfrastructure.exepid process 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exedescription pid process target process PID 1452 set thread context of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe -
Drops file in Windows directory 2 IoCs
Processes:
vbc.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier vbc.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exeBrokerInfrastructure.exepid process 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe 1100 BrokerInfrastructure.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exeBrokerInfrastructure.exedescription pid process Token: SeDebugPrivilege 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe Token: SeDebugPrivilege 1100 BrokerInfrastructure.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exeBrokerInfrastructure.exedescription pid process target process PID 1452 wrote to memory of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe PID 1452 wrote to memory of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe PID 1452 wrote to memory of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe PID 1452 wrote to memory of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe PID 1452 wrote to memory of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe PID 1452 wrote to memory of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe PID 1452 wrote to memory of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe PID 1452 wrote to memory of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe PID 1452 wrote to memory of 2004 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe vbc.exe PID 1452 wrote to memory of 1100 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe BrokerInfrastructure.exe PID 1452 wrote to memory of 1100 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe BrokerInfrastructure.exe PID 1452 wrote to memory of 1100 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe BrokerInfrastructure.exe PID 1452 wrote to memory of 1100 1452 bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe BrokerInfrastructure.exe PID 1100 wrote to memory of 944 1100 BrokerInfrastructure.exe AudioEndpointBuilder.exe PID 1100 wrote to memory of 944 1100 BrokerInfrastructure.exe AudioEndpointBuilder.exe PID 1100 wrote to memory of 944 1100 BrokerInfrastructure.exe AudioEndpointBuilder.exe PID 1100 wrote to memory of 944 1100 BrokerInfrastructure.exe AudioEndpointBuilder.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe"C:\Users\Admin\AppData\Local\Temp\bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"2⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Roaming\Microsoft\BrokerInfrastructure.exe"C:\Users\Admin\AppData\Roaming\Microsoft\BrokerInfrastructure.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\AudioEndpointBuilder.exeC:\Users\Admin\AppData\Roaming\Microsoft\\AudioEndpointBuilder3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\AudioEndpointBuilder.exeFilesize
447KB
MD5754411f368178a09f54d05158e7e17a3
SHA1b781c408c69827af768eeca418f564e14eaf5eaf
SHA256bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651
SHA5125d2083dbfc24efa11608ba443a8f2468685a11bda1502fed1c2774e737d64813f26723d8c8d16904cfe616746ad167b34c5c50936faf516934b6bcab113f8c7a
-
C:\Users\Admin\AppData\Roaming\Microsoft\AudioEndpointBuilder.exeFilesize
447KB
MD5754411f368178a09f54d05158e7e17a3
SHA1b781c408c69827af768eeca418f564e14eaf5eaf
SHA256bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651
SHA5125d2083dbfc24efa11608ba443a8f2468685a11bda1502fed1c2774e737d64813f26723d8c8d16904cfe616746ad167b34c5c50936faf516934b6bcab113f8c7a
-
C:\Users\Admin\AppData\Roaming\Microsoft\BrokerInfrastructure.exeFilesize
12KB
MD5c2054cedfcb281d110cc4c7d4745cac8
SHA162c4ceee116166d960d76de5feba706b5812b7af
SHA25620b179fd6a6faffbb65bf310e6138fc2706a6dee3618830bbce7d2d549e32b5f
SHA51265993d5cd049cb753b65f61bef2ba06d91c6faefcec0e105c47208b090b60c5db40206df47387ca087b98f482dba3b8aba81d491722ea925429d902d52a22fbc
-
C:\Users\Admin\AppData\Roaming\Microsoft\BrokerInfrastructure.exeFilesize
12KB
MD5c2054cedfcb281d110cc4c7d4745cac8
SHA162c4ceee116166d960d76de5feba706b5812b7af
SHA25620b179fd6a6faffbb65bf310e6138fc2706a6dee3618830bbce7d2d549e32b5f
SHA51265993d5cd049cb753b65f61bef2ba06d91c6faefcec0e105c47208b090b60c5db40206df47387ca087b98f482dba3b8aba81d491722ea925429d902d52a22fbc
-
\Users\Admin\AppData\Roaming\Microsoft\AudioEndpointBuilder.exeFilesize
447KB
MD5754411f368178a09f54d05158e7e17a3
SHA1b781c408c69827af768eeca418f564e14eaf5eaf
SHA256bbd8bfb4294a7764093ab934ecabe1f7147cfc539238c6426779786b6acd0651
SHA5125d2083dbfc24efa11608ba443a8f2468685a11bda1502fed1c2774e737d64813f26723d8c8d16904cfe616746ad167b34c5c50936faf516934b6bcab113f8c7a
-
\Users\Admin\AppData\Roaming\Microsoft\BrokerInfrastructure.exeFilesize
12KB
MD5c2054cedfcb281d110cc4c7d4745cac8
SHA162c4ceee116166d960d76de5feba706b5812b7af
SHA25620b179fd6a6faffbb65bf310e6138fc2706a6dee3618830bbce7d2d549e32b5f
SHA51265993d5cd049cb753b65f61bef2ba06d91c6faefcec0e105c47208b090b60c5db40206df47387ca087b98f482dba3b8aba81d491722ea925429d902d52a22fbc
-
memory/944-81-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB
-
memory/944-78-0x0000000000000000-mapping.dmp
-
memory/1100-82-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB
-
memory/1100-75-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB
-
memory/1100-71-0x0000000000000000-mapping.dmp
-
memory/1452-54-0x0000000075041000-0x0000000075043000-memory.dmpFilesize
8KB
-
memory/1452-56-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB
-
memory/1452-55-0x0000000074550000-0x0000000074AFB000-memory.dmpFilesize
5.7MB
-
memory/2004-60-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2004-69-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2004-68-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2004-64-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2004-65-0x0000000000402196-mapping.dmp
-
memory/2004-62-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2004-58-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2004-57-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB