Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
oglcache.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
oglcache.exe
Resource
win10v2004-20240508-en
General
-
Target
oglcache.exe
-
Size
301KB
-
MD5
fcb719e28da41dd7443017eb1f456ff3
-
SHA1
cc1e37fc84fe746523a1413989fb29a9e72d12c9
-
SHA256
2b2668fa5331ffa99fc11d881fbce91927bfac1a8ec5705b6412c7903543116a
-
SHA512
fb1d2bad04d248f6f13ba06238714b412f27cc0972f4d4a92ab01e2b9154f0094dbec496b800d7c59d4c2ad1d882927c50c111d504c5e51144ff25ef0bdbdb86
-
SSDEEP
6144:UjuQW8XJjgbWXwGp7h5qN/Ay8ouP+BlwAIJ:pQ9X9gbWXVpzq9Ay8ou+Blw
Malware Config
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2032-13-0x0000000000400000-0x0000000000450000-memory.dmp netwire behavioral1/memory/2652-22-0x0000000000400000-0x0000000000450000-memory.dmp netwire -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1Y4LVU7-YS70-GIFA-N4M7-5M38886E5XK4}\ OGLCache.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E1Y4LVU7-YS70-GIFA-N4M7-5M38886E5XK4}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\AMD\\OGLCache.exe\"" OGLCache.exe -
Executes dropped EXE 1 IoCs
pid Process 2652 OGLCache.exe -
Loads dropped DLL 2 IoCs
pid Process 2032 oglcache.exe 2032 oglcache.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lollipop = "C:\\Users\\Admin\\AppData\\Roaming\\AMD\\OGLCache.exe" OGLCache.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OGLCache.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString OGLCache.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2032 oglcache.exe 2652 OGLCache.exe 2652 OGLCache.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2648 2032 oglcache.exe 28 PID 2032 wrote to memory of 2648 2032 oglcache.exe 28 PID 2032 wrote to memory of 2648 2032 oglcache.exe 28 PID 2032 wrote to memory of 2648 2032 oglcache.exe 28 PID 2032 wrote to memory of 2652 2032 oglcache.exe 29 PID 2032 wrote to memory of 2652 2032 oglcache.exe 29 PID 2032 wrote to memory of 2652 2032 oglcache.exe 29 PID 2032 wrote to memory of 2652 2032 oglcache.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\oglcache.exe"C:\Users\Admin\AppData\Local\Temp\oglcache.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe+" "C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe"2⤵PID:2648
-
-
C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe"C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe"2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301KB
MD5fcb719e28da41dd7443017eb1f456ff3
SHA1cc1e37fc84fe746523a1413989fb29a9e72d12c9
SHA2562b2668fa5331ffa99fc11d881fbce91927bfac1a8ec5705b6412c7903543116a
SHA512fb1d2bad04d248f6f13ba06238714b412f27cc0972f4d4a92ab01e2b9154f0094dbec496b800d7c59d4c2ad1d882927c50c111d504c5e51144ff25ef0bdbdb86