Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
EMV Writer Reader Software v8.exe
Resource
win7-20240708-en
General
-
Target
EMV Writer Reader Software v8.exe
-
Size
1.3MB
-
MD5
f368225b07c15a58fc20c022b5d67ac7
-
SHA1
0b91bffa3098fc586516a08c10a641c0f01a4337
-
SHA256
e146c7e9223d84f76c59a0979facb49a347bb1b1427df98334a22b348bb624cd
-
SHA512
678de6e96ba0caf0daf6e00c7da37018cbcb3cf0bd7384e7a1a21e0d23e4a0bda3b42adaae38e037e61c0e53d40db53273b98da305a9149fe69111dea0199fb6
-
SSDEEP
24576:gRmJk9oQrilOIz+yMxPaknyxaKwdGyR/iOcYs1PtGaGw4o:ZJwoQryTtMxPaksa91RKHbUS
Malware Config
Extracted
netwire
teamviewer.ddns.net:3360
local.cable-modem.org:3360
local-cable.duckdns.org:3360
-
activex_autorun
true
-
activex_key
{I428F72B-17T1-3YB6-KVXD-ED316JPXN378}
-
copy_executable
true
-
delete_original
false
-
host_id
mypesse
-
install_path
%AppData%\Onedrivel\Prevhostwin10.exe
-
keylogger_dir
%AppData%\systemprev\
-
lock_executable
false
-
mutex
nSOFwQuC
-
offline_keylogger
true
-
password
memek
-
registry_autorun
true
-
startup_name
Microsft@operati
-
use_mutex
true
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/3640-26-0x00000000000C0000-0x00000000000F3000-memory.dmp netwire behavioral2/memory/3640-29-0x00000000000C0000-0x00000000000F3000-memory.dmp netwire behavioral2/memory/3640-32-0x00000000000C0000-0x00000000000F3000-memory.dmp netwire behavioral2/memory/1948-45-0x00000000000C0000-0x00000000000F3000-memory.dmp netwire -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{I428F72B-17T1-3YB6-KVXD-ED316JPXN378} Prevhostwin10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{I428F72B-17T1-3YB6-KVXD-ED316JPXN378}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\Onedrivel\\Prevhostwin10.exe\"" Prevhostwin10.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Prevhosti32.exe -
Executes dropped EXE 5 IoCs
pid Process 1776 Prevhosti32.exe 4472 v81.exe 3640 Prevhosti32.exe 3512 Prevhostwin10.exe 1948 Prevhostwin10.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsft@operati = "C:\\Users\\Admin\\AppData\\Roaming\\Onedrivel\\Prevhostwin10.exe" Prevhostwin10.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00070000000234a3-6.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1776 set thread context of 3640 1776 Prevhosti32.exe 94 PID 3512 set thread context of 1948 3512 Prevhostwin10.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EMV Writer Reader Software v8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Prevhosti32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Prevhosti32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Prevhostwin10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Prevhostwin10.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4060 wrote to memory of 1776 4060 EMV Writer Reader Software v8.exe 84 PID 4060 wrote to memory of 1776 4060 EMV Writer Reader Software v8.exe 84 PID 4060 wrote to memory of 1776 4060 EMV Writer Reader Software v8.exe 84 PID 4060 wrote to memory of 4472 4060 EMV Writer Reader Software v8.exe 85 PID 4060 wrote to memory of 4472 4060 EMV Writer Reader Software v8.exe 85 PID 4060 wrote to memory of 4472 4060 EMV Writer Reader Software v8.exe 85 PID 1776 wrote to memory of 3640 1776 Prevhosti32.exe 94 PID 1776 wrote to memory of 3640 1776 Prevhosti32.exe 94 PID 1776 wrote to memory of 3640 1776 Prevhosti32.exe 94 PID 1776 wrote to memory of 3640 1776 Prevhosti32.exe 94 PID 1776 wrote to memory of 3640 1776 Prevhosti32.exe 94 PID 3640 wrote to memory of 3512 3640 Prevhosti32.exe 97 PID 3640 wrote to memory of 3512 3640 Prevhosti32.exe 97 PID 3640 wrote to memory of 3512 3640 Prevhosti32.exe 97 PID 3512 wrote to memory of 1948 3512 Prevhostwin10.exe 98 PID 3512 wrote to memory of 1948 3512 Prevhostwin10.exe 98 PID 3512 wrote to memory of 1948 3512 Prevhostwin10.exe 98 PID 3512 wrote to memory of 1948 3512 Prevhostwin10.exe 98 PID 3512 wrote to memory of 1948 3512 Prevhostwin10.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\EMV Writer Reader Software v8.exe"C:\Users\Admin\AppData\Local\Temp\EMV Writer Reader Software v8.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Roaming\Prevhosti32.exeC:\Users\Admin\AppData\Roaming/Prevhosti32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Roaming\Prevhosti32.exe"C:\Users\Admin\AppData\Roaming\Prevhosti32.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"C:\Users\Admin\AppData\Roaming\Onedrivel\Prevhostwin10.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1948
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\v81.exeC:\Users\Admin\AppData\Local\Temp/v81.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4472
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5c9a3ccf95369f53cd448fac94ff4e3b8
SHA148131cd75821aad01ace71277206b7c6d7d4925c
SHA256dc32698c13de42e87913c6d90939186a56ca4586e0397df52ed85e47443ceef4
SHA512eeec3a8dd76cee4a1d774f7f34766742c6b92d833f8a92adb251cb618924935d3fbaf5c386b7c5291489ad805d3233dfd8b41aaafd73851aa9b410b45ff86e3a
-
Filesize
952KB
MD536327d32f1978968985e132470a0ef8b
SHA12edb5e5e682f2efb74c0d43c5b83d839a36fba49
SHA256a21b113d0f6bfc37895210a1b1df396133d0f4f35076bdab714750b20037ea92
SHA512e57d2a584347d177a590ea85f4cf8a6abd3d51e31e89044e5e96be9cb5be4b5ebf99edf8f5afe1940982e7e778c36a02a742599ef3a14c5125ca1ec3cef65472