Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 14:30
Static task
static1
Behavioral task
behavioral1
Sample
de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe
Resource
win7-20240221-en
General
-
Target
de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe
-
Size
1.8MB
-
MD5
3e597147b7f94ea1cce064c11edffc42
-
SHA1
b0c99c182b72ebe313e16fe8baa12e211a43719e
-
SHA256
de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788
-
SHA512
4b596a8d942facc979af49ab7d792ad2109333a0621c99c432cfca591364594c56c3df4b5231f0b9efa98f437b932990770b0651fd530777714c7c7757aac3bf
-
SSDEEP
49152:CZ0vs+yQeQlKyXsZdRtoVqq0xzBJGD4YOFltFAYH:CKvsZHQlKyc1o0ZbeNO7QYH
Malware Config
Extracted
netwire
researchplanet.zapto.org:1810
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
GroupMTwo
-
keylogger_dir
%AppData%\Diagnostics\
-
lock_executable
false
-
offline_keylogger
true
-
password
kte5OCJBj0k0D9RY6dq0
-
registry_autorun
false
-
use_mutex
false
Extracted
latentbot
researchplanet.zapto.org
Signatures
-
NetWire RAT payload 3 IoCs
resource yara_rule behavioral1/memory/804-89-0x0000000000400000-0x000000000042F000-memory.dmp netwire behavioral1/memory/804-91-0x0000000000400000-0x000000000042F000-memory.dmp netwire behavioral1/memory/804-92-0x0000000000400000-0x000000000042F000-memory.dmp netwire -
Nirsoft 1 IoCs
resource yara_rule behavioral1/files/0x000700000001418d-15.dat Nirsoft -
Executes dropped EXE 4 IoCs
pid Process 2604 cfrutil.exe 3000 Wexpand.exe 1880 IntelCpHDCPSvc.exe 596 bJXfJ.exe -
Loads dropped DLL 8 IoCs
pid Process 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 2468 cmd.exe 2580 cmd.exe 1880 IntelCpHDCPSvc.exe -
resource yara_rule behavioral1/memory/804-85-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/804-88-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/804-89-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/804-91-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral1/memory/804-92-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2296 schtasks.exe 2740 schtasks.exe 2728 schtasks.exe 2752 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 500 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2604 cfrutil.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 500 AcroRd32.exe 500 AcroRd32.exe 1880 IntelCpHDCPSvc.exe 1880 IntelCpHDCPSvc.exe 500 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2604 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 28 PID 2036 wrote to memory of 2604 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 28 PID 2036 wrote to memory of 2604 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 28 PID 2036 wrote to memory of 2604 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 28 PID 2036 wrote to memory of 2604 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 28 PID 2036 wrote to memory of 2604 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 28 PID 2036 wrote to memory of 2604 2036 de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe 28 PID 2604 wrote to memory of 2532 2604 cfrutil.exe 29 PID 2604 wrote to memory of 2532 2604 cfrutil.exe 29 PID 2604 wrote to memory of 2532 2604 cfrutil.exe 29 PID 2604 wrote to memory of 2532 2604 cfrutil.exe 29 PID 2604 wrote to memory of 2532 2604 cfrutil.exe 29 PID 2604 wrote to memory of 2532 2604 cfrutil.exe 29 PID 2604 wrote to memory of 2532 2604 cfrutil.exe 29 PID 2532 wrote to memory of 2436 2532 cscript.exe 31 PID 2532 wrote to memory of 2436 2532 cscript.exe 31 PID 2532 wrote to memory of 2436 2532 cscript.exe 31 PID 2532 wrote to memory of 2436 2532 cscript.exe 31 PID 2532 wrote to memory of 2436 2532 cscript.exe 31 PID 2532 wrote to memory of 2436 2532 cscript.exe 31 PID 2532 wrote to memory of 2436 2532 cscript.exe 31 PID 2532 wrote to memory of 2580 2532 cscript.exe 33 PID 2532 wrote to memory of 2580 2532 cscript.exe 33 PID 2532 wrote to memory of 2580 2532 cscript.exe 33 PID 2532 wrote to memory of 2580 2532 cscript.exe 33 PID 2532 wrote to memory of 2580 2532 cscript.exe 33 PID 2532 wrote to memory of 2580 2532 cscript.exe 33 PID 2532 wrote to memory of 2580 2532 cscript.exe 33 PID 2532 wrote to memory of 2468 2532 cscript.exe 35 PID 2532 wrote to memory of 2468 2532 cscript.exe 35 PID 2532 wrote to memory of 2468 2532 cscript.exe 35 PID 2532 wrote to memory of 2468 2532 cscript.exe 35 PID 2532 wrote to memory of 2468 2532 cscript.exe 35 PID 2532 wrote to memory of 2468 2532 cscript.exe 35 PID 2532 wrote to memory of 2468 2532 cscript.exe 35 PID 2532 wrote to memory of 2444 2532 cscript.exe 37 PID 2532 wrote to memory of 2444 2532 cscript.exe 37 PID 2532 wrote to memory of 2444 2532 cscript.exe 37 PID 2532 wrote to memory of 2444 2532 cscript.exe 37 PID 2532 wrote to memory of 2444 2532 cscript.exe 37 PID 2532 wrote to memory of 2444 2532 cscript.exe 37 PID 2532 wrote to memory of 2444 2532 cscript.exe 37 PID 2532 wrote to memory of 2128 2532 cscript.exe 38 PID 2532 wrote to memory of 2128 2532 cscript.exe 38 PID 2532 wrote to memory of 2128 2532 cscript.exe 38 PID 2532 wrote to memory of 2128 2532 cscript.exe 38 PID 2532 wrote to memory of 2128 2532 cscript.exe 38 PID 2532 wrote to memory of 2128 2532 cscript.exe 38 PID 2532 wrote to memory of 2128 2532 cscript.exe 38 PID 2468 wrote to memory of 3000 2468 cmd.exe 41 PID 2468 wrote to memory of 3000 2468 cmd.exe 41 PID 2468 wrote to memory of 3000 2468 cmd.exe 41 PID 2468 wrote to memory of 3000 2468 cmd.exe 41 PID 2468 wrote to memory of 3000 2468 cmd.exe 41 PID 2468 wrote to memory of 3000 2468 cmd.exe 41 PID 2468 wrote to memory of 3000 2468 cmd.exe 41 PID 2532 wrote to memory of 2324 2532 cscript.exe 42 PID 2532 wrote to memory of 2324 2532 cscript.exe 42 PID 2532 wrote to memory of 2324 2532 cscript.exe 42 PID 2532 wrote to memory of 2324 2532 cscript.exe 42 PID 2532 wrote to memory of 2324 2532 cscript.exe 42 PID 2532 wrote to memory of 2324 2532 cscript.exe 42 PID 2532 wrote to memory of 2324 2532 cscript.exe 42 PID 2532 wrote to memory of 2472 2532 cscript.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe"C:\Users\Admin\AppData\Local\Temp\de302a61e5f07b0e65753355d44d22181a2742ac3a92aa058bdcd00cc4dab788.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Photoshop\cfrutil.exe"C:\Photoshop\cfrutil.exe" /run2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" //B AlvarSauceda.vbs3⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Photoshop\Overview.pdf4⤵PID:2436
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Photoshop\Overview.pdf"5⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:500
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Photoshop\IntelCpHDCPSvc.exe4⤵
- Loads dropped DLL
PID:2580 -
C:\Photoshop\IntelCpHDCPSvc.exeC:\Photoshop\IntelCpHDCPSvc.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\bJXfJ.exe"C:\Users\Admin\AppData\Local\Temp\bJXfJ.exe"6⤵
- Executes dropped EXE
PID:596
-
-
C:\Windows\SysWOW64\dllhost.exedllhost.exe6⤵PID:804
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Photoshop\Wexpand x 66.rar -pbrauUHCbPsrXgJh4iV7i4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Photoshop\Wexpand.exeC:\Photoshop\Wexpand x 66.rar -pbrauUHCbPsrXgJh4iV7i5⤵
- Executes dropped EXE
PID:3000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS /Create /SC MINUTE /MO 11 /TN MarchTWENTYFIVE1 /TR C:\Photoshop\TiWorker.exe /F4⤵PID:2444
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 11 /TN MarchTWENTYFIVE1 /TR C:\Photoshop\TiWorker.exe /F5⤵
- Creates scheduled task(s)
PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS /Create /SC MINUTE /MO 47 /TN MarchTWENTYFIVE2 /TR C:\Photoshop\SrTasks.exe /F4⤵PID:2128
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC MINUTE /MO 47 /TN MarchTWENTYFIVE2 /TR C:\Photoshop\SrTasks.exe /F5⤵
- Creates scheduled task(s)
PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS /Create /SC HOURLY /MO 2 /TN MarchTWENTYFIVE3 /TR C:\Photoshop\DbxSvc.exe /F4⤵PID:2324
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC HOURLY /MO 2 /TN MarchTWENTYFIVE3 /TR C:\Photoshop\DbxSvc.exe /F5⤵
- Creates scheduled task(s)
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c SCHTASKS /Create /SC DAILY /MO 1 /TN MarchTWENTYFIVE4 /TR C:\Photoshop\RtkBtManServ.exe /F4⤵PID:2472
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /Create /SC DAILY /MO 1 /TN MarchTWENTYFIVE4 /TR C:\Photoshop\RtkBtManServ.exe /F5⤵
- Creates scheduled task(s)
PID:2296
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5902dab657069fca4c0b5255be4045982
SHA11ca5e20e92aecf97870a592db396340a03030fd2
SHA256b6d24d45d8455f8423784868437c064dac29a2eb9ed2d81e16f2cf553e139e17
SHA512eb7cfee5d08e723a45c26f75da78088533feceda1eb0067aa2419bbe51d8778d122200f7d0af24a4b12d78a8f4a5720adc9ca1260373090c00adc4eb3040c4af
-
Filesize
19KB
MD5b25afb40264dd6b93844916f62b29786
SHA1acb5beae76a4173517edc6a2ccb86c3c0d50dc58
SHA25629f5942781e972bd387ec2b204945b94d4ab7f196b79601c36b523318067fc77
SHA5121e62ccaced3a23f36c7898d3e01f53e63d3515ab87d3836f7ee5a6b9e305f02553d5cabe57d5dc8ce621e27c25609e65d5b9d6f3c62f3e243269af740ef85b52
-
Filesize
16.1MB
MD59c2c060a8eeadfec92725be78e4439ac
SHA196832afc97b1d0acb172d606f2da32857392a702
SHA2562ac63156b30fde7109b647fa8d8ca61f98d6c6315a031803413fa6e262db8cb2
SHA51261aac19396d9d11b6670969bd0b4c6c949c45b3cca64ab72f4febc97f82ac507909cd46d2bb6ea4d72d138e1e00f068e806d95592e172cddd32da0a17b09b396
-
Filesize
87KB
MD57a285fc97a4f471767a2e50f193c3ddc
SHA1a34751df8311142e42d0d1d1a41a69cb6957f3ae
SHA2563b005f2f4f7d3a8a5f9e6a0e344c1e451a0365f2f47950da35683a98b9fc8daa
SHA512ffaafb42c2106306506edd19384aec872e4d78b76774e219388795d30199ef16c4309fb5c0996b7756077eac800ff0464ccc80715e2fbac5ebad800723447407
-
Filesize
801B
MD5892d631fdf7d838538a46279f8611a09
SHA1834cead869e32337322cfff233fcfbb86e4f0e6b
SHA256a909c896e69b7d4f8ee6ff863e4bdcbfb58b30e60a4977b0e2d3d1942ab1ba3c
SHA512e472d5f0fb5c18aa4957573d2a85b643a095364003d4beb15e0894a3482c8d8382f388dfed846d6e99fd8b488f25916fc780f09dd376dfc29cdc7eca2b06ab7c
-
Filesize
3KB
MD575ed9a34e40034a5f67ecd6176729f51
SHA1ebc7447c2221df9485bf9d5497be1ab0e523e7f8
SHA256dc46fbf68050e731b2eb9244248a00aedb31678a299cbe15e0ec27f03da8f32f
SHA51265812a907e707b31cb69e5b8299d310d6a276ae4fc33bfeb3a4267f92108354b5a797022084748c82440e1339720ba572edb2845977042835f2ee0a9f911ac96
-
Filesize
193KB
MD5578da05d920d3c450e3f8ba5ecc2afb5
SHA15a6c4dd5f7aea02fa33b0af044fb517151c20dfe
SHA25614e2fb9cff35dfa28550ea823b4106c7015ac6888373f0ff740f97e91b72c8b3
SHA512cc8cf968e9c1ce5f9dec9ddefd3aa2ab6510a76c75f8afc797326aefec5e6a2a44a13278ae4b8566a368e35266d7d06840a6e9decddc9283504dbd7b8af2eba3
-
Filesize
88KB
MD54d9c5b2b2d6237a768fc843d329763f4
SHA1513b0c4fafc306f65960b559b615d2dfac0e7bd3
SHA256f21ec80032f5dabef2d6ad17753b0f2f733fdea7f8af64f82946bdebc68c0d50
SHA51245cd3af906e39dd668eb630dba76bc31b89372166845092633582f9b3d8b3c6d79f3ea9f433b22cba023983bf09918466cb1b021adfaeec1dac2e9c28619dce2
-
Filesize
42KB
MD5ea7baab0792c846de451001fae0fbd5f
SHA14b9cca7bd204b3f15eb55317f27956d8250673e0
SHA256296bc4ae04280d275ca6b5bec8695a4d8796311540333243cc1277695e78400c
SHA5129c42626acfba53de2fe63f239b5502f6b805edf56d175675f43b239c0d85c5bff8e765006cbc2dacd30dc8c9b368f49308f66fd99c6cac5ee7f7cfb05631ee72