Analysis
-
max time kernel
129s -
max time network
73s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 15:10
Static task
static1
Behavioral task
behavioral1
Sample
ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe
Resource
win10v2004-20220812-en
General
-
Target
ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe
-
Size
476KB
-
MD5
79aa2b8dacf7b786c5d1c84ad5bd7b83
-
SHA1
cbabb849547a604f3d97f4881f7e735c683084bd
-
SHA256
ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd
-
SHA512
c5817c47cc0acca676ce06a63a3519f21c3c91f5753da7700745b6cd96a8115b7bd8ea34689b3a8f7125c1fdce1ad91e22f534fb6347e700389daa901291ae5e
-
SSDEEP
3072:wkkIMPKsWiHtHnTi0LwolBYce3pDsQKtSWY3HGyfJEeA7IpgMNK02ewbudNWU/U:fD3sWiY0koA9sBSWcdf6eidYt
Malware Config
Extracted
netwire
extensions14718.sytes.net:3324
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
lock_executable
false
-
mutex
pjtcCJSh
-
offline_keylogger
false
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-70-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/1992-71-0x000000000040231A-mapping.dmp netwire behavioral1/memory/1992-75-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/1992-76-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
firefoxpro.exefirefoxpro.exepid process 1752 firefoxpro.exe 1992 firefoxpro.exe -
Loads dropped DLL 3 IoCs
Processes:
WScript.exefirefoxpro.exepid process 1496 WScript.exe 1496 WScript.exe 1752 firefoxpro.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\firefox = "C:\\Users\\Admin\\AppData\\Local\\Temp\\subfolder\\firefoxpro.vbs" WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
firefoxpro.exedescription pid process target process PID 1752 set thread context of 1992 1752 firefoxpro.exe firefoxpro.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exefirefoxpro.exepid process 1340 ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe 1752 firefoxpro.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exeWScript.exefirefoxpro.exedescription pid process target process PID 1340 wrote to memory of 1496 1340 ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe WScript.exe PID 1340 wrote to memory of 1496 1340 ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe WScript.exe PID 1340 wrote to memory of 1496 1340 ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe WScript.exe PID 1340 wrote to memory of 1496 1340 ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe WScript.exe PID 1496 wrote to memory of 1752 1496 WScript.exe firefoxpro.exe PID 1496 wrote to memory of 1752 1496 WScript.exe firefoxpro.exe PID 1496 wrote to memory of 1752 1496 WScript.exe firefoxpro.exe PID 1496 wrote to memory of 1752 1496 WScript.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe PID 1752 wrote to memory of 1992 1752 firefoxpro.exe firefoxpro.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe"C:\Users\Admin\AppData\Local\Temp\ed8a1d7a009815e9d7d1e4eb4064bb842bf22fccd57f47feee4dd1cc9798c9fd.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.vbs"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exe"C:\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exe"C:\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exe"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exeFilesize
476KB
MD56167b7295d9bad6d37176e96382b9e86
SHA1a77e85e3885a51ce43a3844ce9811282d288a7b2
SHA2564598724a5016b215d2fa970976783e866b925cb49aad2f018b75f8e652e57d3a
SHA5122df31d3bd4e9a3433c22254f60c43c1c86f705608676a8ec219a930a7cdba82fc1d0db5853997d39af30cea49ed785718415f921c60e4dc6c95c926b656afc76
-
C:\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exeFilesize
476KB
MD56167b7295d9bad6d37176e96382b9e86
SHA1a77e85e3885a51ce43a3844ce9811282d288a7b2
SHA2564598724a5016b215d2fa970976783e866b925cb49aad2f018b75f8e652e57d3a
SHA5122df31d3bd4e9a3433c22254f60c43c1c86f705608676a8ec219a930a7cdba82fc1d0db5853997d39af30cea49ed785718415f921c60e4dc6c95c926b656afc76
-
C:\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exeFilesize
476KB
MD56167b7295d9bad6d37176e96382b9e86
SHA1a77e85e3885a51ce43a3844ce9811282d288a7b2
SHA2564598724a5016b215d2fa970976783e866b925cb49aad2f018b75f8e652e57d3a
SHA5122df31d3bd4e9a3433c22254f60c43c1c86f705608676a8ec219a930a7cdba82fc1d0db5853997d39af30cea49ed785718415f921c60e4dc6c95c926b656afc76
-
C:\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.vbsFilesize
1024B
MD55633ea06d76d044e23ff5ed058b09cac
SHA1a5f8798527ceb451ac6db8fa16649359d34ab896
SHA25641e8e3ab92c8a25c6c3442cb6dc4eeaffa243573b81c0cf742312465ed20ce9f
SHA512ddb54c48df72c7c80cb2f14c5b59a9de26dcfe3acef468e706eccd59e20962977d4c3957a456d07fdaea182fffdccd5f34feb5dc64a3e7cf02f2549df6835595
-
\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exeFilesize
476KB
MD56167b7295d9bad6d37176e96382b9e86
SHA1a77e85e3885a51ce43a3844ce9811282d288a7b2
SHA2564598724a5016b215d2fa970976783e866b925cb49aad2f018b75f8e652e57d3a
SHA5122df31d3bd4e9a3433c22254f60c43c1c86f705608676a8ec219a930a7cdba82fc1d0db5853997d39af30cea49ed785718415f921c60e4dc6c95c926b656afc76
-
\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exeFilesize
476KB
MD56167b7295d9bad6d37176e96382b9e86
SHA1a77e85e3885a51ce43a3844ce9811282d288a7b2
SHA2564598724a5016b215d2fa970976783e866b925cb49aad2f018b75f8e652e57d3a
SHA5122df31d3bd4e9a3433c22254f60c43c1c86f705608676a8ec219a930a7cdba82fc1d0db5853997d39af30cea49ed785718415f921c60e4dc6c95c926b656afc76
-
\Users\Admin\AppData\Local\Temp\subfolder\firefoxpro.exeFilesize
476KB
MD56167b7295d9bad6d37176e96382b9e86
SHA1a77e85e3885a51ce43a3844ce9811282d288a7b2
SHA2564598724a5016b215d2fa970976783e866b925cb49aad2f018b75f8e652e57d3a
SHA5122df31d3bd4e9a3433c22254f60c43c1c86f705608676a8ec219a930a7cdba82fc1d0db5853997d39af30cea49ed785718415f921c60e4dc6c95c926b656afc76
-
memory/1340-56-0x0000000076411000-0x0000000076413000-memory.dmpFilesize
8KB
-
memory/1340-57-0x0000000000250000-0x0000000000257000-memory.dmpFilesize
28KB
-
memory/1496-58-0x0000000000000000-mapping.dmp
-
memory/1752-64-0x0000000000000000-mapping.dmp
-
memory/1992-70-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1992-71-0x000000000040231A-mapping.dmp
-
memory/1992-75-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1992-76-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB