Analysis
-
max time kernel
146s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 11:38
Static task
static1
Behavioral task
behavioral1
Sample
01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe
Resource
win7-20220812-en
General
-
Target
01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe
-
Size
157KB
-
MD5
1b1ee2cddf6295c45045c5c19f64c97c
-
SHA1
999c3bec2e1c5c2c5f343343f3fdc882d466f2c7
-
SHA256
01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904
-
SHA512
e3c5172947ec8405f0d406036b9487695079722d25b1430c2cccbae1e7bb7818f72317e3e02bd967b6c4aad6be67da670e71160ff506b58a08fb0fb376e4548f
-
SSDEEP
3072:5xUH7LJ8EqJR4c5XEtVPUYMTQknntozSPBqJ/wWix3wq3dinkajFyV26:5xUH/J8FRXLM/wWix3wq3gDjFyV26
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1744-70-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral1/memory/1584-91-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
winhst.exewinhst.exepid process 1088 winhst.exe 1584 winhst.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
winhst.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0VH30DK4-78V0-W3AI-37S7-VWR010J7WQ53}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Install\\winhst.exe\"" winhst.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0VH30DK4-78V0-W3AI-37S7-VWR010J7WQ53} winhst.exe -
Loads dropped DLL 1 IoCs
Processes:
01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exepid process 1744 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
winhst.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ winhst.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\syhst1 = "C:\\Users\\Admin\\AppData\\Roaming\\Install\\winhst.exe" winhst.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exewinhst.exedescription pid process target process PID 1636 set thread context of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1088 set thread context of 1584 1088 winhst.exe winhst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exewinhst.exedescription pid process Token: SeDebugPrivilege 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe Token: SeDebugPrivilege 1088 winhst.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exewinhst.exedescription pid process target process PID 1636 wrote to memory of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1636 wrote to memory of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1636 wrote to memory of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1636 wrote to memory of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1636 wrote to memory of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1636 wrote to memory of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1636 wrote to memory of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1636 wrote to memory of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1636 wrote to memory of 1744 1636 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe PID 1744 wrote to memory of 1088 1744 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe winhst.exe PID 1744 wrote to memory of 1088 1744 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe winhst.exe PID 1744 wrote to memory of 1088 1744 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe winhst.exe PID 1744 wrote to memory of 1088 1744 01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe winhst.exe PID 1088 wrote to memory of 1584 1088 winhst.exe winhst.exe PID 1088 wrote to memory of 1584 1088 winhst.exe winhst.exe PID 1088 wrote to memory of 1584 1088 winhst.exe winhst.exe PID 1088 wrote to memory of 1584 1088 winhst.exe winhst.exe PID 1088 wrote to memory of 1584 1088 winhst.exe winhst.exe PID 1088 wrote to memory of 1584 1088 winhst.exe winhst.exe PID 1088 wrote to memory of 1584 1088 winhst.exe winhst.exe PID 1088 wrote to memory of 1584 1088 winhst.exe winhst.exe PID 1088 wrote to memory of 1584 1088 winhst.exe winhst.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe"C:\Users\Admin\AppData\Local\Temp\01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe"C:\Users\Admin\AppData\Local\Temp\01f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\winhst.exe"C:\Users\Admin\AppData\Roaming\Install\winhst.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\winhst.exe"C:\Users\Admin\AppData\Roaming\Install\winhst.exe"4⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Install\winhst.exeFilesize
157KB
MD51b1ee2cddf6295c45045c5c19f64c97c
SHA1999c3bec2e1c5c2c5f343343f3fdc882d466f2c7
SHA25601f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904
SHA512e3c5172947ec8405f0d406036b9487695079722d25b1430c2cccbae1e7bb7818f72317e3e02bd967b6c4aad6be67da670e71160ff506b58a08fb0fb376e4548f
-
C:\Users\Admin\AppData\Roaming\Install\winhst.exeFilesize
157KB
MD51b1ee2cddf6295c45045c5c19f64c97c
SHA1999c3bec2e1c5c2c5f343343f3fdc882d466f2c7
SHA25601f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904
SHA512e3c5172947ec8405f0d406036b9487695079722d25b1430c2cccbae1e7bb7818f72317e3e02bd967b6c4aad6be67da670e71160ff506b58a08fb0fb376e4548f
-
C:\Users\Admin\AppData\Roaming\Install\winhst.exeFilesize
157KB
MD51b1ee2cddf6295c45045c5c19f64c97c
SHA1999c3bec2e1c5c2c5f343343f3fdc882d466f2c7
SHA25601f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904
SHA512e3c5172947ec8405f0d406036b9487695079722d25b1430c2cccbae1e7bb7818f72317e3e02bd967b6c4aad6be67da670e71160ff506b58a08fb0fb376e4548f
-
\Users\Admin\AppData\Roaming\Install\winhst.exeFilesize
157KB
MD51b1ee2cddf6295c45045c5c19f64c97c
SHA1999c3bec2e1c5c2c5f343343f3fdc882d466f2c7
SHA25601f2e272be7404ce5c9d13bb0afe224e9257477bff1be0bbaa8c51f1b270a904
SHA512e3c5172947ec8405f0d406036b9487695079722d25b1430c2cccbae1e7bb7818f72317e3e02bd967b6c4aad6be67da670e71160ff506b58a08fb0fb376e4548f
-
memory/1088-88-0x0000000074340000-0x00000000748EB000-memory.dmpFilesize
5.7MB
-
memory/1088-72-0x0000000000000000-mapping.dmp
-
memory/1088-76-0x0000000074340000-0x00000000748EB000-memory.dmpFilesize
5.7MB
-
memory/1584-91-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1584-85-0x0000000000401ED7-mapping.dmp
-
memory/1584-90-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1636-67-0x00000000748F0000-0x0000000074E9B000-memory.dmpFilesize
5.7MB
-
memory/1636-54-0x00000000761F1000-0x00000000761F3000-memory.dmpFilesize
8KB
-
memory/1636-56-0x00000000748F0000-0x0000000074E9B000-memory.dmpFilesize
5.7MB
-
memory/1636-55-0x00000000748F0000-0x0000000074E9B000-memory.dmpFilesize
5.7MB
-
memory/1744-60-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1744-70-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1744-69-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1744-65-0x0000000000401ED7-mapping.dmp
-
memory/1744-64-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1744-62-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1744-58-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1744-57-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB