Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 19:33
Static task
static1
Behavioral task
behavioral1
Sample
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe
Resource
win7-20220812-en
General
-
Target
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe
-
Size
1.3MB
-
MD5
961dddaec1b5d6c68d4f8513af5da04c
-
SHA1
7ca4b9dbfdc0c2c443479648645b739434c484a8
-
SHA256
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1
-
SHA512
1a94af7539e3f8848b6d10f1597c065b8cc8b68c6ce607b224ec0114aac625118f361c8dcffa826ea9ce16cc64e66eb0c95aab1059315d57c477ad8af74929c1
-
SSDEEP
24576:dVJn/G7I/BagGiOhE+cxWISFJ62I5yxZDNtRwhzliUQVI6rNYsYusC7:7J+qFOhE+WSLFKStRwhxiMKAuz7
Malware Config
Extracted
netwire
bots.xdecryptedx.life:4528
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
mutex
sTvcsXlx
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
true
Signatures
-
NetWire RAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1796-64-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/1796-70-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/700-74-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/1796-75-0x0000000000400000-0x0000000000420000-memory.dmp netwire behavioral1/memory/1796-76-0x0000000000400000-0x0000000000420000-memory.dmp netwire -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
Processes:
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exeSystemBooster.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions SystemBooster.exe -
Executes dropped EXE 1 IoCs
Processes:
SystemBooster.exepid process 1676 SystemBooster.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
Processes:
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exeSystemBooster.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools SystemBooster.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
SystemBooster.exee65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SystemBooster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SystemBooster.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe -
Loads dropped DLL 1 IoCs
Processes:
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exepid process 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exeSystemBooster.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SystemBooster.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 SystemBooster.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe -
Drops file in System32 directory 2 IoCs
Processes:
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exedescription ioc process File created C:\Windows\SysWOW64\SystemBooster.exe e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe File opened for modification C:\Windows\SysWOW64\SystemBooster.exe e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SystemBooster.exedescription pid process target process PID 1676 set thread context of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 set thread context of 700 1676 SystemBooster.exe RegAsm.exe -
Drops file in Windows directory 2 IoCs
Processes:
RegAsm.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier RegAsm.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\.Identifier RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 45 IoCs
Processes:
SystemBooster.exepid process 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe 1676 SystemBooster.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exeSystemBooster.exedescription pid process Token: SeDebugPrivilege 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe Token: SeDebugPrivilege 1676 SystemBooster.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exeSystemBooster.exedescription pid process target process PID 1972 wrote to memory of 1676 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe SystemBooster.exe PID 1972 wrote to memory of 1676 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe SystemBooster.exe PID 1972 wrote to memory of 1676 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe SystemBooster.exe PID 1972 wrote to memory of 1676 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe SystemBooster.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 1796 1676 SystemBooster.exe RegAsm.exe PID 1676 wrote to memory of 700 1676 SystemBooster.exe RegAsm.exe PID 1972 wrote to memory of 1328 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe schtasks.exe PID 1972 wrote to memory of 1328 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe schtasks.exe PID 1972 wrote to memory of 1328 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe schtasks.exe PID 1972 wrote to memory of 1328 1972 e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe"C:\Users\Admin\AppData\Local\Temp\e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\SystemBooster.exe"C:\Windows\system32\SystemBooster.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
- Drops file in Windows directory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"3⤵
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /SC MINUTE /TN Booster /TR C:\Windows\system32\SystemBooster.exe2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {1C066531-28C6-4E51-95C0-47D5BCFF0532} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\SystemBooster.exeFilesize
1.3MB
MD5961dddaec1b5d6c68d4f8513af5da04c
SHA17ca4b9dbfdc0c2c443479648645b739434c484a8
SHA256e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1
SHA5121a94af7539e3f8848b6d10f1597c065b8cc8b68c6ce607b224ec0114aac625118f361c8dcffa826ea9ce16cc64e66eb0c95aab1059315d57c477ad8af74929c1
-
C:\Windows\SysWOW64\SystemBooster.exeFilesize
1.3MB
MD5961dddaec1b5d6c68d4f8513af5da04c
SHA17ca4b9dbfdc0c2c443479648645b739434c484a8
SHA256e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1
SHA5121a94af7539e3f8848b6d10f1597c065b8cc8b68c6ce607b224ec0114aac625118f361c8dcffa826ea9ce16cc64e66eb0c95aab1059315d57c477ad8af74929c1
-
\Windows\SysWOW64\SystemBooster.exeFilesize
1.3MB
MD5961dddaec1b5d6c68d4f8513af5da04c
SHA17ca4b9dbfdc0c2c443479648645b739434c484a8
SHA256e65a63374804040e16bbc0027f16f1863e292071f80883915e2521ea7d2c13a1
SHA5121a94af7539e3f8848b6d10f1597c065b8cc8b68c6ce607b224ec0114aac625118f361c8dcffa826ea9ce16cc64e66eb0c95aab1059315d57c477ad8af74929c1
-
memory/700-74-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1328-77-0x0000000000000000-mapping.dmp
-
memory/1676-63-0x0000000074690000-0x0000000074C3B000-memory.dmpFilesize
5.7MB
-
memory/1676-61-0x0000000074690000-0x0000000074C3B000-memory.dmpFilesize
5.7MB
-
memory/1676-57-0x0000000000000000-mapping.dmp
-
memory/1796-64-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1796-70-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1796-75-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1796-76-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1972-62-0x0000000074690000-0x0000000074C3B000-memory.dmpFilesize
5.7MB
-
memory/1972-54-0x00000000751A1000-0x00000000751A3000-memory.dmpFilesize
8KB
-
memory/1972-55-0x0000000074690000-0x0000000074C3B000-memory.dmpFilesize
5.7MB
-
memory/1972-78-0x0000000074690000-0x0000000074C3B000-memory.dmpFilesize
5.7MB