Analysis
-
max time kernel
125s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 16:33
Static task
static1
Behavioral task
behavioral1
Sample
Quotation CTT5684.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Quotation CTT5684.exe
Resource
win10v2004-20221111-en
General
-
Target
Quotation CTT5684.exe
-
Size
577KB
-
MD5
870937bfc582473b8b55263cdd9de6c2
-
SHA1
53ef5972b622a434b1fe5e4697445a54e8b387b1
-
SHA256
5e9b3af8cce827e801b56da7dcacf0453baeea54f5df0c66607d9cffa2e76886
-
SHA512
9b883059a465f8d4d468bbb1b17b1020f7fc5874d42176f3ce1682a29ff1841709dcd44502ef8bd411807b12084ead57e02f12db01b151cbf5c7d012acb250d6
-
SSDEEP
12288:vUWcNPJg+MO3/vSLDrw32Zl1zLbHWEpPmB+Rm4mXN4HJUCePad0VL6lwP0FzWSgk:/cJArl1zLbHWEpPmB+Q4mXKHKCePad0w
Malware Config
Extracted
netwire
iammrjeff00.duckdns.org:1181
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
MR-J
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password1
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1920-82-0x0000000000400000-0x0000000000495000-memory.dmp netwire behavioral1/memory/1920-83-0x0000000000400000-0x000000000042C000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
svchost64.exesvchost64.exepid process 1356 svchost64.exe 1920 svchost64.exe -
Loads dropped DLL 3 IoCs
Processes:
Quotation CTT5684.exesvchost64.exepid process 1684 Quotation CTT5684.exe 1684 Quotation CTT5684.exe 1356 svchost64.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Intel (r) = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tem64\\svchost64.vbs -rb" WScript.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost64.exedescription pid process target process PID 1356 set thread context of 1920 1356 svchost64.exe svchost64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Quotation CTT5684.exesvchost64.exepid process 1684 Quotation CTT5684.exe 1356 svchost64.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Quotation CTT5684.exesvchost64.exedescription pid process target process PID 1684 wrote to memory of 1900 1684 Quotation CTT5684.exe WScript.exe PID 1684 wrote to memory of 1900 1684 Quotation CTT5684.exe WScript.exe PID 1684 wrote to memory of 1900 1684 Quotation CTT5684.exe WScript.exe PID 1684 wrote to memory of 1900 1684 Quotation CTT5684.exe WScript.exe PID 1684 wrote to memory of 1356 1684 Quotation CTT5684.exe svchost64.exe PID 1684 wrote to memory of 1356 1684 Quotation CTT5684.exe svchost64.exe PID 1684 wrote to memory of 1356 1684 Quotation CTT5684.exe svchost64.exe PID 1684 wrote to memory of 1356 1684 Quotation CTT5684.exe svchost64.exe PID 1356 wrote to memory of 1920 1356 svchost64.exe svchost64.exe PID 1356 wrote to memory of 1920 1356 svchost64.exe svchost64.exe PID 1356 wrote to memory of 1920 1356 svchost64.exe svchost64.exe PID 1356 wrote to memory of 1920 1356 svchost64.exe svchost64.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quotation CTT5684.exe"C:\Users\Admin\AppData\Local\Temp\Quotation CTT5684.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tem64\svchost64.vbs"2⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\tem64\svchost64.exe"C:\Users\Admin\AppData\Local\Temp\tem64\svchost64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tem64\svchost64.exeC:\Users\Admin\AppData\Local\Temp\tem64\svchost64.exe"3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tem64\svchost64.exeFilesize
577KB
MD5870937bfc582473b8b55263cdd9de6c2
SHA153ef5972b622a434b1fe5e4697445a54e8b387b1
SHA2565e9b3af8cce827e801b56da7dcacf0453baeea54f5df0c66607d9cffa2e76886
SHA5129b883059a465f8d4d468bbb1b17b1020f7fc5874d42176f3ce1682a29ff1841709dcd44502ef8bd411807b12084ead57e02f12db01b151cbf5c7d012acb250d6
-
C:\Users\Admin\AppData\Local\Temp\tem64\svchost64.exeFilesize
577KB
MD5870937bfc582473b8b55263cdd9de6c2
SHA153ef5972b622a434b1fe5e4697445a54e8b387b1
SHA2565e9b3af8cce827e801b56da7dcacf0453baeea54f5df0c66607d9cffa2e76886
SHA5129b883059a465f8d4d468bbb1b17b1020f7fc5874d42176f3ce1682a29ff1841709dcd44502ef8bd411807b12084ead57e02f12db01b151cbf5c7d012acb250d6
-
C:\Users\Admin\AppData\Local\Temp\tem64\svchost64.exeFilesize
577KB
MD5870937bfc582473b8b55263cdd9de6c2
SHA153ef5972b622a434b1fe5e4697445a54e8b387b1
SHA2565e9b3af8cce827e801b56da7dcacf0453baeea54f5df0c66607d9cffa2e76886
SHA5129b883059a465f8d4d468bbb1b17b1020f7fc5874d42176f3ce1682a29ff1841709dcd44502ef8bd411807b12084ead57e02f12db01b151cbf5c7d012acb250d6
-
C:\Users\Admin\AppData\Local\Temp\tem64\svchost64.vbsFilesize
1024B
MD52d3de8adf3832d6c998e092032247281
SHA193a20449e135b41abe7d46b7501483137d28d27b
SHA256d6caced3aa684b19a440facdb71f93777aad35e43cb44e252597a9db8243ec30
SHA512a362410b958687437b636876fb36f71065f9ab4949ed3b18d7ecfeca95dfc65dd7f2091253d3c62f8e0132efdd6b593f22a23f4db520ba70e4b388614e11da5d
-
\Users\Admin\AppData\Local\Temp\tem64\svchost64.exeFilesize
577KB
MD5870937bfc582473b8b55263cdd9de6c2
SHA153ef5972b622a434b1fe5e4697445a54e8b387b1
SHA2565e9b3af8cce827e801b56da7dcacf0453baeea54f5df0c66607d9cffa2e76886
SHA5129b883059a465f8d4d468bbb1b17b1020f7fc5874d42176f3ce1682a29ff1841709dcd44502ef8bd411807b12084ead57e02f12db01b151cbf5c7d012acb250d6
-
\Users\Admin\AppData\Local\Temp\tem64\svchost64.exeFilesize
577KB
MD5870937bfc582473b8b55263cdd9de6c2
SHA153ef5972b622a434b1fe5e4697445a54e8b387b1
SHA2565e9b3af8cce827e801b56da7dcacf0453baeea54f5df0c66607d9cffa2e76886
SHA5129b883059a465f8d4d468bbb1b17b1020f7fc5874d42176f3ce1682a29ff1841709dcd44502ef8bd411807b12084ead57e02f12db01b151cbf5c7d012acb250d6
-
\Users\Admin\AppData\Local\Temp\tem64\svchost64.exeFilesize
577KB
MD5870937bfc582473b8b55263cdd9de6c2
SHA153ef5972b622a434b1fe5e4697445a54e8b387b1
SHA2565e9b3af8cce827e801b56da7dcacf0453baeea54f5df0c66607d9cffa2e76886
SHA5129b883059a465f8d4d468bbb1b17b1020f7fc5874d42176f3ce1682a29ff1841709dcd44502ef8bd411807b12084ead57e02f12db01b151cbf5c7d012acb250d6
-
memory/1356-71-0x0000000000640000-0x0000000000647000-memory.dmpFilesize
28KB
-
memory/1356-79-0x0000000077CD0000-0x0000000077E50000-memory.dmpFilesize
1.5MB
-
memory/1356-62-0x0000000000000000-mapping.dmp
-
memory/1356-77-0x0000000000640000-0x0000000000647000-memory.dmpFilesize
28KB
-
memory/1356-78-0x0000000077AF0000-0x0000000077C99000-memory.dmpFilesize
1.7MB
-
memory/1684-66-0x00000000003D0000-0x00000000003D7000-memory.dmpFilesize
28KB
-
memory/1684-70-0x0000000077CD0000-0x0000000077E50000-memory.dmpFilesize
1.5MB
-
memory/1684-56-0x00000000003D0000-0x00000000003D7000-memory.dmpFilesize
28KB
-
memory/1684-63-0x0000000077AF0000-0x0000000077C99000-memory.dmpFilesize
1.7MB
-
memory/1684-57-0x0000000076401000-0x0000000076403000-memory.dmpFilesize
8KB
-
memory/1684-64-0x0000000077CD0000-0x0000000077E50000-memory.dmpFilesize
1.5MB
-
memory/1900-58-0x0000000000000000-mapping.dmp
-
memory/1920-75-0x0000000000485EA4-mapping.dmp
-
memory/1920-80-0x00000000002A0000-0x00000000002A7000-memory.dmpFilesize
28KB
-
memory/1920-82-0x0000000000400000-0x0000000000495000-memory.dmpFilesize
596KB
-
memory/1920-83-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/1920-89-0x0000000077AF0000-0x0000000077C99000-memory.dmpFilesize
1.7MB
-
memory/1920-90-0x00000000002A0000-0x00000000002A7000-memory.dmpFilesize
28KB