Analysis
-
max time kernel
141s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
EMV Writer Reader Software v8.exe
Resource
win7-20240708-en
General
-
Target
EMV Writer Reader Software v8.exe
-
Size
1.3MB
-
MD5
f368225b07c15a58fc20c022b5d67ac7
-
SHA1
0b91bffa3098fc586516a08c10a641c0f01a4337
-
SHA256
e146c7e9223d84f76c59a0979facb49a347bb1b1427df98334a22b348bb624cd
-
SHA512
678de6e96ba0caf0daf6e00c7da37018cbcb3cf0bd7384e7a1a21e0d23e4a0bda3b42adaae38e037e61c0e53d40db53273b98da305a9149fe69111dea0199fb6
-
SSDEEP
24576:gRmJk9oQrilOIz+yMxPaknyxaKwdGyR/iOcYs1PtGaGw4o:ZJwoQryTtMxPaksa91RKHbUS
Malware Config
Extracted
netwire
teamviewer.ddns.net:3360
local.cable-modem.org:3360
local-cable.duckdns.org:3360
-
activex_autorun
true
-
activex_key
{I428F72B-17T1-3YB6-KVXD-ED316JPXN378}
-
copy_executable
true
-
delete_original
false
-
host_id
mypesse
-
install_path
%AppData%\Onedrivel\Prevhostwin10.exe
-
keylogger_dir
%AppData%\systemprev\
-
lock_executable
false
-
mutex
nSOFwQuC
-
offline_keylogger
true
-
password
memek
-
registry_autorun
true
-
startup_name
Microsft@operati
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral1/memory/2068-35-0x00000000000B0000-0x00000000000E3000-memory.dmp netwire behavioral1/memory/2068-38-0x00000000000B0000-0x00000000000E3000-memory.dmp netwire behavioral1/memory/2068-41-0x00000000000B0000-0x00000000000E3000-memory.dmp netwire behavioral1/memory/2612-56-0x00000000000B0000-0x00000000000E3000-memory.dmp netwire -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{I428F72B-17T1-3YB6-KVXD-ED316JPXN378} Prevhostwin10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{I428F72B-17T1-3YB6-KVXD-ED316JPXN378}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Onedrivel\\Prevhostwin10.exe\"" Prevhostwin10.exe -
Executes dropped EXE 5 IoCs
pid Process 2236 Prevhosti32.exe 2396 v81.exe 2068 Prevhosti32.exe 2636 Prevhostwin10.exe 2612 Prevhostwin10.exe -
Loads dropped DLL 6 IoCs
pid Process 2292 EMV Writer Reader Software v8.exe 2292 EMV Writer Reader Software v8.exe 2292 EMV Writer Reader Software v8.exe 2292 EMV Writer Reader Software v8.exe 2068 Prevhosti32.exe 2068 Prevhosti32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsft@operati = "C:\\Users\\Admin\\AppData\\Roaming\\Onedrivel\\Prevhostwin10.exe" Prevhostwin10.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000016d5a-5.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2236 set thread context of 2068 2236 Prevhosti32.exe 30 PID 2636 set thread context of 2612 2636 Prevhostwin10.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Prevhosti32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Prevhostwin10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Prevhostwin10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EMV Writer Reader Software v8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Prevhosti32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v81.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 v81.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2236 2292 EMV Writer Reader Software v8.exe 28 PID 2292 wrote to memory of 2236 2292 EMV Writer Reader Software v8.exe 28 PID 2292 wrote to memory of 2236 2292 EMV Writer Reader Software v8.exe 28 PID 2292 wrote to memory of 2236 2292 EMV Writer Reader Software v8.exe 28 PID 2292 wrote to memory of 2396 2292 EMV Writer Reader Software v8.exe 29 PID 2292 wrote to memory of 2396 2292 EMV Writer Reader Software v8.exe 29 PID 2292 wrote to memory of 2396 2292 EMV Writer Reader Software v8.exe 29 PID 2292 wrote to memory of 2396 2292 EMV Writer Reader Software v8.exe 29 PID 2236 wrote to memory of 2068 2236 Prevhosti32.exe 30 PID 2236 wrote to memory of 2068 2236 Prevhosti32.exe 30 PID 2236 wrote to memory of 2068 2236 Prevhosti32.exe 30 PID 2236 wrote to memory of 2068 2236 Prevhosti32.exe 30 PID 2236 wrote to memory of 2068 2236 Prevhosti32.exe 30 PID 2236 wrote to memory of 2068 2236 Prevhosti32.exe 30 PID 2068 wrote to memory of 2636 2068 Prevhosti32.exe 31 PID 2068 wrote to memory of 2636 2068 Prevhosti32.exe 31 PID 2068 wrote to memory of 2636 2068 Prevhosti32.exe 31 PID 2068 wrote to memory of 2636 2068 Prevhosti32.exe 31 PID 2636 wrote to memory of 2612 2636 Prevhostwin10.exe 32 PID 2636 wrote to memory of 2612 2636 Prevhostwin10.exe 32 PID 2636 wrote to memory of 2612 2636 Prevhostwin10.exe 32 PID 2636 wrote to memory of 2612 2636 Prevhostwin10.exe 32 PID 2636 wrote to memory of 2612 2636 Prevhostwin10.exe 32 PID 2636 wrote to memory of 2612 2636 Prevhostwin10.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\EMV Writer Reader Software v8.exe"C:\Users\Admin\AppData\Local\Temp\EMV Writer Reader Software v8.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Roaming\Prevhosti32.exeC:\Users\Admin\AppData\Roaming/Prevhosti32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Roaming\Prevhosti32.exe"C:\Users\Admin\AppData\Roaming\Prevhosti32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\v81.exeC:\Users\Admin\AppData\Local\Temp/v81.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5c9a3ccf95369f53cd448fac94ff4e3b8
SHA148131cd75821aad01ace71277206b7c6d7d4925c
SHA256dc32698c13de42e87913c6d90939186a56ca4586e0397df52ed85e47443ceef4
SHA512eeec3a8dd76cee4a1d774f7f34766742c6b92d833f8a92adb251cb618924935d3fbaf5c386b7c5291489ad805d3233dfd8b41aaafd73851aa9b410b45ff86e3a
-
Filesize
952KB
MD536327d32f1978968985e132470a0ef8b
SHA12edb5e5e682f2efb74c0d43c5b83d839a36fba49
SHA256a21b113d0f6bfc37895210a1b1df396133d0f4f35076bdab714750b20037ea92
SHA512e57d2a584347d177a590ea85f4cf8a6abd3d51e31e89044e5e96be9cb5be4b5ebf99edf8f5afe1940982e7e778c36a02a742599ef3a14c5125ca1ec3cef65472