Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 12:49

General

  • Target

    oglcache.exe

  • Size

    301KB

  • MD5

    fcb719e28da41dd7443017eb1f456ff3

  • SHA1

    cc1e37fc84fe746523a1413989fb29a9e72d12c9

  • SHA256

    2b2668fa5331ffa99fc11d881fbce91927bfac1a8ec5705b6412c7903543116a

  • SHA512

    fb1d2bad04d248f6f13ba06238714b412f27cc0972f4d4a92ab01e2b9154f0094dbec496b800d7c59d4c2ad1d882927c50c111d504c5e51144ff25ef0bdbdb86

  • SSDEEP

    6144:UjuQW8XJjgbWXwGp7h5qN/Ay8ouP+BlwAIJ:pQ9X9gbWXVpzq9Ay8ou+Blw

Malware Config

Signatures

  • NetWire RAT payload 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\oglcache.exe
    "C:\Users\Admin\AppData\Local\Temp\oglcache.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Windows\SysWOW64\cmd.exe
      /c copy "C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe+" "C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe"
      2⤵
        PID:2192
      • C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe
        "C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe"
        2⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Adds Run key to start application
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:5096

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\AMD\OGLCache.exe

      Filesize

      301KB

      MD5

      fcb719e28da41dd7443017eb1f456ff3

      SHA1

      cc1e37fc84fe746523a1413989fb29a9e72d12c9

      SHA256

      2b2668fa5331ffa99fc11d881fbce91927bfac1a8ec5705b6412c7903543116a

      SHA512

      fb1d2bad04d248f6f13ba06238714b412f27cc0972f4d4a92ab01e2b9154f0094dbec496b800d7c59d4c2ad1d882927c50c111d504c5e51144ff25ef0bdbdb86

    • memory/3480-0-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/3480-2-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/3480-3-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/3480-4-0x0000000000490000-0x0000000000491000-memory.dmp

      Filesize

      4KB

    • memory/3480-1-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/3480-9-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/5096-14-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/5096-17-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB