Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 12:49

General

  • Target

    oglcache.exe

  • Size

    301KB

  • MD5

    fcb719e28da41dd7443017eb1f456ff3

  • SHA1

    cc1e37fc84fe746523a1413989fb29a9e72d12c9

  • SHA256

    2b2668fa5331ffa99fc11d881fbce91927bfac1a8ec5705b6412c7903543116a

  • SHA512

    fb1d2bad04d248f6f13ba06238714b412f27cc0972f4d4a92ab01e2b9154f0094dbec496b800d7c59d4c2ad1d882927c50c111d504c5e51144ff25ef0bdbdb86

  • SSDEEP

    6144:UjuQW8XJjgbWXwGp7h5qN/Ay8ouP+BlwAIJ:pQ9X9gbWXVpzq9Ay8ou+Blw

Malware Config

Signatures

  • NetWire RAT payload 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\oglcache.exe
    "C:\Users\Admin\AppData\Local\Temp\oglcache.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\cmd.exe
      /c copy "C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe+" "C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe"
      2⤵
        PID:2648
      • C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe
        "C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe"
        2⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:2652

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Roaming\AMD\OGLCache.exe

      Filesize

      301KB

      MD5

      fcb719e28da41dd7443017eb1f456ff3

      SHA1

      cc1e37fc84fe746523a1413989fb29a9e72d12c9

      SHA256

      2b2668fa5331ffa99fc11d881fbce91927bfac1a8ec5705b6412c7903543116a

      SHA512

      fb1d2bad04d248f6f13ba06238714b412f27cc0972f4d4a92ab01e2b9154f0094dbec496b800d7c59d4c2ad1d882927c50c111d504c5e51144ff25ef0bdbdb86

    • memory/2032-1-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/2032-2-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/2032-4-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/2032-3-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/2032-13-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/2652-19-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/2652-22-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB