Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
09-02-2023 10:25
Static task
static1
General
-
Target
jdks.exe
-
Size
3.3MB
-
MD5
1ab9fdceab1dc5b1e1f13c24a98fdb93
-
SHA1
890fa430810fecdb9d782959ca3d59be2bed25f6
-
SHA256
6d7d8799da7b16c8422dc43558d3df61030443b8a5532947159d7f45a66023ba
-
SHA512
ee885aba3a94e39e0d3494a58f82bd89d080777d41abd21c97b8d19cdb29133e7c2302b5981211a26406519d8ed370ba80f2613100db7cf9c2bd1f1037857565
-
SSDEEP
49152:lFAZOskMJnefYZ3AXGIrShvBTA1CkYp3NJ9:6ONuUI8GbvBTA1ypr
Malware Config
Extracted
netwire
asorock0011.ddns.net:5389
wcbradley.duckdns.org:5389
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
LAST CRYPT 0918
-
install_path
%AppData%\Install\jdks.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
FWbuMAeG
-
offline_keylogger
true
-
password
teamoluwa1
-
registry_autorun
true
-
startup_name
oskd
-
use_mutex
true
Signatures
-
NetWire RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1000-278-0x0000000000400000-0x000000000074B000-memory.dmp netwire -
Executes dropped EXE 3 IoCs
Processes:
rigigi.exejdks.exerigigi.exepid process 4172 rigigi.exe 3580 jdks.exe 4884 rigigi.exe -
Drops file in Windows directory 3 IoCs
Processes:
rigigi.exejdks.exejdks.exedescription ioc process File opened for modification C:\Windows\win.ini rigigi.exe File opened for modification C:\Windows\win.ini jdks.exe File opened for modification C:\Windows\win.ini jdks.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
jdks.exejdks.exerigigi.exejdks.exepid process 2832 jdks.exe 1000 jdks.exe 4172 rigigi.exe 3580 jdks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
jdks.exejdks.exerigigi.exedescription pid process target process PID 2832 wrote to memory of 1000 2832 jdks.exe jdks.exe PID 2832 wrote to memory of 1000 2832 jdks.exe jdks.exe PID 2832 wrote to memory of 1000 2832 jdks.exe jdks.exe PID 1000 wrote to memory of 4172 1000 jdks.exe rigigi.exe PID 1000 wrote to memory of 4172 1000 jdks.exe rigigi.exe PID 1000 wrote to memory of 4172 1000 jdks.exe rigigi.exe PID 1000 wrote to memory of 3580 1000 jdks.exe jdks.exe PID 1000 wrote to memory of 3580 1000 jdks.exe jdks.exe PID 1000 wrote to memory of 3580 1000 jdks.exe jdks.exe PID 4172 wrote to memory of 4884 4172 rigigi.exe rigigi.exe PID 4172 wrote to memory of 4884 4172 rigigi.exe rigigi.exe PID 4172 wrote to memory of 4884 4172 rigigi.exe rigigi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\jdks.exe"C:\Users\Admin\AppData\Local\Temp\jdks.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\jdks.exe"C:\Users\Admin\AppData\Local\Temp\jdks.exe"2⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\rigigi.exe"C:\Users\Admin\rigigi.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\rigigi.exe"C:\Users\Admin\rigigi.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Install\jdks.exe"C:\Users\Admin\AppData\Roaming\Install\jdks.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Install\jdks.exeFilesize
3.3MB
MD51ab9fdceab1dc5b1e1f13c24a98fdb93
SHA1890fa430810fecdb9d782959ca3d59be2bed25f6
SHA2566d7d8799da7b16c8422dc43558d3df61030443b8a5532947159d7f45a66023ba
SHA512ee885aba3a94e39e0d3494a58f82bd89d080777d41abd21c97b8d19cdb29133e7c2302b5981211a26406519d8ed370ba80f2613100db7cf9c2bd1f1037857565
-
C:\Users\Admin\AppData\Roaming\Install\jdks.exeFilesize
3.3MB
MD51ab9fdceab1dc5b1e1f13c24a98fdb93
SHA1890fa430810fecdb9d782959ca3d59be2bed25f6
SHA2566d7d8799da7b16c8422dc43558d3df61030443b8a5532947159d7f45a66023ba
SHA512ee885aba3a94e39e0d3494a58f82bd89d080777d41abd21c97b8d19cdb29133e7c2302b5981211a26406519d8ed370ba80f2613100db7cf9c2bd1f1037857565
-
C:\Users\Admin\rigigi.exeFilesize
1.1MB
MD583d11d267bab479ef602635cf573f975
SHA12e05b91b2a9332caf814971cfbd57e06be5fb30c
SHA256525325c8999dc6db546598f71fc8952eef6b022e8b072b39d255c225d1887a02
SHA51290acf4e9c88706639b1b51eb7d2ba166d7aaeda1319834af1192b032be98d09f6c09d6ddf15a17d85754cae897c05e5232cc975460a04f6be499b4b6319a1bb4
-
C:\Users\Admin\rigigi.exeFilesize
1.1MB
MD583d11d267bab479ef602635cf573f975
SHA12e05b91b2a9332caf814971cfbd57e06be5fb30c
SHA256525325c8999dc6db546598f71fc8952eef6b022e8b072b39d255c225d1887a02
SHA51290acf4e9c88706639b1b51eb7d2ba166d7aaeda1319834af1192b032be98d09f6c09d6ddf15a17d85754cae897c05e5232cc975460a04f6be499b4b6319a1bb4
-
C:\Users\Admin\rigigi.exeFilesize
1.1MB
MD583d11d267bab479ef602635cf573f975
SHA12e05b91b2a9332caf814971cfbd57e06be5fb30c
SHA256525325c8999dc6db546598f71fc8952eef6b022e8b072b39d255c225d1887a02
SHA51290acf4e9c88706639b1b51eb7d2ba166d7aaeda1319834af1192b032be98d09f6c09d6ddf15a17d85754cae897c05e5232cc975460a04f6be499b4b6319a1bb4
-
C:\Windows\win.iniFilesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06
-
C:\Windows\win.iniFilesize
123B
MD56bf517432f65eb7f0d18d574bf14124c
SHA15b9f37c1dd1318ebbec3bd2f07c109eb9d22c727
SHA2566e2b70dfccabf3cc651545676a3a566c9cfae03f15f772886646abce1da35b46
SHA5127b0cb8c20034585ec8bf4b45eda5eda5993a56e24931a7426dc5a9f081ec1f82545f3e26a48a4df885c8691fc6e8026d0808aebe3cc3358ba85ddca08ac4cb06
-
memory/1000-189-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-185-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-237-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-233-0x00007FFBD3450000-0x00007FFBD362B000-memory.dmpFilesize
1.9MB
-
memory/1000-235-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-232-0x00000000008A0000-0x00000000009EA000-memory.dmpFilesize
1.3MB
-
memory/1000-278-0x0000000000400000-0x000000000074B000-memory.dmpFilesize
3.3MB
-
memory/1000-174-0x0000000000000000-mapping.dmp
-
memory/1000-188-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-186-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-187-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-275-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-184-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-182-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-183-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-181-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-180-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-179-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-178-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-176-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/1000-175-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-141-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-177-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-152-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-153-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-154-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-156-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-157-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-155-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-158-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-159-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-160-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-161-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-162-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-163-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-164-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-165-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-166-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-167-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-168-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-169-0x0000000002DB0000-0x0000000002DBA000-memory.dmpFilesize
40KB
-
memory/2832-171-0x00007FFBD3450000-0x00007FFBD362B000-memory.dmpFilesize
1.9MB
-
memory/2832-172-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-170-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-173-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-149-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-147-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-146-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-150-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-145-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-144-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-143-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-142-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-120-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-140-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-139-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-138-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-137-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-136-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-135-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-134-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-133-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-132-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-131-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-130-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-129-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-128-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-121-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-127-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-122-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-126-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-125-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-124-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/2832-123-0x00000000772F0000-0x000000007747E000-memory.dmpFilesize
1.6MB
-
memory/3580-267-0x0000000000000000-mapping.dmp
-
memory/4172-240-0x0000000000000000-mapping.dmp
-
memory/4884-354-0x0000000000000000-mapping.dmp