Analysis
-
max time kernel
98s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-01-2023 06:46
Static task
static1
Behavioral task
behavioral1
Sample
GBO -590 ORDER.exe
Resource
win7-20221111-en
General
-
Target
GBO -590 ORDER.exe
-
Size
833KB
-
MD5
1a9ce8f81c2b5e3dbd4de1681975f1e1
-
SHA1
1e5ec9bf8bb045caa2c9e1090444d8b5a07fa19b
-
SHA256
de1dca28f32c8367c84d51ae14b26c4432f91e0845dc0db65fdb4ccb7eefbcb0
-
SHA512
5aa435dbee766fe7395cb58f5e3ff1f2795b9348e7f7706e494e1a848715132ef99ad77aaef9b8c5f0408a37e34651d37ea75674576a37b61e5336f89dea7fe5
-
SSDEEP
12288:yf0bR6AbG9g+ULV7/yCabiYgONmRyUVzgMl79f7y7m:o0bVa9ALFy5eOERyUWq7NyK
Malware Config
Extracted
netwire
212.193.30.230:7324
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
Password123
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/1908-69-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1908-71-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1908-72-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1908-75-0x000000000041AD7B-mapping.dmp netwire behavioral1/memory/1908-74-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1908-78-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1908-83-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1728-106-0x000000000041AD7B-mapping.dmp netwire behavioral1/memory/1728-110-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1728-112-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral1/memory/1728-114-0x0000000000400000-0x000000000044F000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
Host.exeHost.exepid process 392 Host.exe 1728 Host.exe -
Loads dropped DLL 2 IoCs
Processes:
GBO -590 ORDER.exepid process 1908 GBO -590 ORDER.exe 1908 GBO -590 ORDER.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
GBO -590 ORDER.exeHost.exedescription pid process target process PID 1584 set thread context of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 392 set thread context of 1728 392 Host.exe Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
GBO -590 ORDER.exepowershell.exeHost.exepowershell.exepid process 1584 GBO -590 ORDER.exe 1584 GBO -590 ORDER.exe 468 powershell.exe 392 Host.exe 848 powershell.exe 392 Host.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
GBO -590 ORDER.exepowershell.exeHost.exepowershell.exedescription pid process Token: SeDebugPrivilege 1584 GBO -590 ORDER.exe Token: SeDebugPrivilege 468 powershell.exe Token: SeDebugPrivilege 392 Host.exe Token: SeDebugPrivilege 848 powershell.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
GBO -590 ORDER.exeGBO -590 ORDER.exeHost.exedescription pid process target process PID 1584 wrote to memory of 468 1584 GBO -590 ORDER.exe powershell.exe PID 1584 wrote to memory of 468 1584 GBO -590 ORDER.exe powershell.exe PID 1584 wrote to memory of 468 1584 GBO -590 ORDER.exe powershell.exe PID 1584 wrote to memory of 468 1584 GBO -590 ORDER.exe powershell.exe PID 1584 wrote to memory of 764 1584 GBO -590 ORDER.exe schtasks.exe PID 1584 wrote to memory of 764 1584 GBO -590 ORDER.exe schtasks.exe PID 1584 wrote to memory of 764 1584 GBO -590 ORDER.exe schtasks.exe PID 1584 wrote to memory of 764 1584 GBO -590 ORDER.exe schtasks.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1584 wrote to memory of 1908 1584 GBO -590 ORDER.exe GBO -590 ORDER.exe PID 1908 wrote to memory of 392 1908 GBO -590 ORDER.exe Host.exe PID 1908 wrote to memory of 392 1908 GBO -590 ORDER.exe Host.exe PID 1908 wrote to memory of 392 1908 GBO -590 ORDER.exe Host.exe PID 1908 wrote to memory of 392 1908 GBO -590 ORDER.exe Host.exe PID 392 wrote to memory of 848 392 Host.exe powershell.exe PID 392 wrote to memory of 848 392 Host.exe powershell.exe PID 392 wrote to memory of 848 392 Host.exe powershell.exe PID 392 wrote to memory of 848 392 Host.exe powershell.exe PID 392 wrote to memory of 920 392 Host.exe schtasks.exe PID 392 wrote to memory of 920 392 Host.exe schtasks.exe PID 392 wrote to memory of 920 392 Host.exe schtasks.exe PID 392 wrote to memory of 920 392 Host.exe schtasks.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe PID 392 wrote to memory of 1728 392 Host.exe Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GBO -590 ORDER.exe"C:\Users\Admin\AppData\Local\Temp\GBO -590 ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QmkdACHcaWibL.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QmkdACHcaWibL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9E82.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\GBO -590 ORDER.exe"C:\Users\Admin\AppData\Local\Temp\GBO -590 ORDER.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QmkdACHcaWibL.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QmkdACHcaWibL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmp"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp3E0B.tmpFilesize
1KB
MD5d3d3ef033e0d691983473013a3c311bd
SHA1b488071727ea809d573ecf8c0ea9c5648245d3ad
SHA256e5537110ce83512e9c62de905a63be60688179e3df56ad6d97f6b9636da246b6
SHA512e3347f05e61a23f733fcf01bd5c94ee166f96020afd1c3695cf98f78eb6c9599dd4a2f25270e3a40babc421366dcb505714c00e330d94ff0da60ccb9b3269a25
-
C:\Users\Admin\AppData\Local\Temp\tmp9E82.tmpFilesize
1KB
MD5d3d3ef033e0d691983473013a3c311bd
SHA1b488071727ea809d573ecf8c0ea9c5648245d3ad
SHA256e5537110ce83512e9c62de905a63be60688179e3df56ad6d97f6b9636da246b6
SHA512e3347f05e61a23f733fcf01bd5c94ee166f96020afd1c3695cf98f78eb6c9599dd4a2f25270e3a40babc421366dcb505714c00e330d94ff0da60ccb9b3269a25
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
833KB
MD51a9ce8f81c2b5e3dbd4de1681975f1e1
SHA11e5ec9bf8bb045caa2c9e1090444d8b5a07fa19b
SHA256de1dca28f32c8367c84d51ae14b26c4432f91e0845dc0db65fdb4ccb7eefbcb0
SHA5125aa435dbee766fe7395cb58f5e3ff1f2795b9348e7f7706e494e1a848715132ef99ad77aaef9b8c5f0408a37e34651d37ea75674576a37b61e5336f89dea7fe5
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
833KB
MD51a9ce8f81c2b5e3dbd4de1681975f1e1
SHA11e5ec9bf8bb045caa2c9e1090444d8b5a07fa19b
SHA256de1dca28f32c8367c84d51ae14b26c4432f91e0845dc0db65fdb4ccb7eefbcb0
SHA5125aa435dbee766fe7395cb58f5e3ff1f2795b9348e7f7706e494e1a848715132ef99ad77aaef9b8c5f0408a37e34651d37ea75674576a37b61e5336f89dea7fe5
-
C:\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
833KB
MD51a9ce8f81c2b5e3dbd4de1681975f1e1
SHA11e5ec9bf8bb045caa2c9e1090444d8b5a07fa19b
SHA256de1dca28f32c8367c84d51ae14b26c4432f91e0845dc0db65fdb4ccb7eefbcb0
SHA5125aa435dbee766fe7395cb58f5e3ff1f2795b9348e7f7706e494e1a848715132ef99ad77aaef9b8c5f0408a37e34651d37ea75674576a37b61e5336f89dea7fe5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD5e1f364cb2cd2fc5e034285bb2b767f81
SHA1846bbc2aadcd06d7c6239b7dd47c05a47ffd42b8
SHA256b2740427e1890c6338ce0084b9aa97f86b0996cbca93667aa1c8a739e8c1c71d
SHA5129377e2194c9cb9a0717c85c26db6d8cfe0f2d07c0e644b2e1ba0437d038e12a32eaafd3765b8d9220bdab461ebf6d17fb3e48b5e8eb8db90dd38037e1a152eae
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
833KB
MD51a9ce8f81c2b5e3dbd4de1681975f1e1
SHA11e5ec9bf8bb045caa2c9e1090444d8b5a07fa19b
SHA256de1dca28f32c8367c84d51ae14b26c4432f91e0845dc0db65fdb4ccb7eefbcb0
SHA5125aa435dbee766fe7395cb58f5e3ff1f2795b9348e7f7706e494e1a848715132ef99ad77aaef9b8c5f0408a37e34651d37ea75674576a37b61e5336f89dea7fe5
-
\Users\Admin\AppData\Roaming\Install\Host.exeFilesize
833KB
MD51a9ce8f81c2b5e3dbd4de1681975f1e1
SHA11e5ec9bf8bb045caa2c9e1090444d8b5a07fa19b
SHA256de1dca28f32c8367c84d51ae14b26c4432f91e0845dc0db65fdb4ccb7eefbcb0
SHA5125aa435dbee766fe7395cb58f5e3ff1f2795b9348e7f7706e494e1a848715132ef99ad77aaef9b8c5f0408a37e34651d37ea75674576a37b61e5336f89dea7fe5
-
memory/392-88-0x0000000000520000-0x0000000000536000-memory.dmpFilesize
88KB
-
memory/392-85-0x00000000010B0000-0x0000000001186000-memory.dmpFilesize
856KB
-
memory/392-81-0x0000000000000000-mapping.dmp
-
memory/468-89-0x000000006EB50000-0x000000006F0FB000-memory.dmpFilesize
5.7MB
-
memory/468-87-0x000000006EB50000-0x000000006F0FB000-memory.dmpFilesize
5.7MB
-
memory/468-59-0x0000000000000000-mapping.dmp
-
memory/764-60-0x0000000000000000-mapping.dmp
-
memory/848-113-0x0000000072BB0000-0x000000007315B000-memory.dmpFilesize
5.7MB
-
memory/848-111-0x0000000072BB0000-0x000000007315B000-memory.dmpFilesize
5.7MB
-
memory/848-90-0x0000000000000000-mapping.dmp
-
memory/920-91-0x0000000000000000-mapping.dmp
-
memory/1584-57-0x0000000000350000-0x000000000035A000-memory.dmpFilesize
40KB
-
memory/1584-56-0x0000000000340000-0x0000000000356000-memory.dmpFilesize
88KB
-
memory/1584-63-0x0000000007DB0000-0x0000000007DFC000-memory.dmpFilesize
304KB
-
memory/1584-55-0x0000000075491000-0x0000000075493000-memory.dmpFilesize
8KB
-
memory/1584-58-0x00000000080C0000-0x0000000008144000-memory.dmpFilesize
528KB
-
memory/1584-54-0x0000000001000000-0x00000000010D6000-memory.dmpFilesize
856KB
-
memory/1728-114-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1728-112-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1728-110-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1728-106-0x000000000041AD7B-mapping.dmp
-
memory/1908-67-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1908-69-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1908-75-0x000000000041AD7B-mapping.dmp
-
memory/1908-74-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1908-78-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1908-65-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1908-72-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1908-64-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1908-71-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB
-
memory/1908-83-0x0000000000400000-0x000000000044F000-memory.dmpFilesize
316KB