Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 03:05
Static task
static1
Behavioral task
behavioral1
Sample
Proof of payment.exe
Resource
win7-20240903-en
General
-
Target
Proof of payment.exe
-
Size
1006KB
-
MD5
7e1d18de24aeff3df526dc7ab6ff05dc
-
SHA1
49f9323be153edc7d4467aa3280f9afc3d6b1533
-
SHA256
629333f4adba87b2412a8c8fa301a25042de764506ea1f369b38fa10c6112547
-
SHA512
999e7c19a26fe755132bba012884410d9a181beaa476aade615f3961e2ca911de988d35d04a196ee76748469ac1a0b1c0330d0a7728d574318872766c364449e
-
SSDEEP
24576:6NA3R5drXdtBeHJePXzHbuzBux7s3oFQYcEn7W:z5bEaxIo6V
Malware Config
Extracted
netwire
185.140.53.220:3363
185.140.53.220:3369
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
NETHERLAND
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 2 IoCs
resource yara_rule behavioral1/memory/3044-64-0x00000000002B0000-0x00000000008AA000-memory.dmp netwire behavioral1/memory/3044-66-0x00000000002B0000-0x00000000008AA000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
pid Process 2916 niubglejwg.pif 3044 RegSvcs.exe -
Loads dropped DLL 5 IoCs
pid Process 2480 Proof of payment.exe 2480 Proof of payment.exe 2480 Proof of payment.exe 2480 Proof of payment.exe 2916 niubglejwg.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\71281781\\NIUBGL~1.PIF C:\\Users\\Admin\\71281781\\gtogdqb.cwv" niubglejwg.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2916 set thread context of 3044 2916 niubglejwg.pif 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Proof of payment.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niubglejwg.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2916 2480 Proof of payment.exe 31 PID 2480 wrote to memory of 2916 2480 Proof of payment.exe 31 PID 2480 wrote to memory of 2916 2480 Proof of payment.exe 31 PID 2480 wrote to memory of 2916 2480 Proof of payment.exe 31 PID 2916 wrote to memory of 3044 2916 niubglejwg.pif 32 PID 2916 wrote to memory of 3044 2916 niubglejwg.pif 32 PID 2916 wrote to memory of 3044 2916 niubglejwg.pif 32 PID 2916 wrote to memory of 3044 2916 niubglejwg.pif 32 PID 2916 wrote to memory of 3044 2916 niubglejwg.pif 32 PID 2916 wrote to memory of 3044 2916 niubglejwg.pif 32 PID 2916 wrote to memory of 3044 2916 niubglejwg.pif 32 PID 2916 wrote to memory of 3044 2916 niubglejwg.pif 32 PID 2916 wrote to memory of 3044 2916 niubglejwg.pif 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proof of payment.exe"C:\Users\Admin\AppData\Local\Temp\Proof of payment.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\71281781\niubglejwg.pif"C:\Users\Admin\71281781\niubglejwg.pif" gtogdqb.cwv2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD59fd93502039581e1eac27a9fe8167334
SHA1f9fc63483e2f8630adc85ff45549a35b75c1d5ed
SHA256bc56f33ece852ee01fa40fdb375875429e25ae3486ccbd5c1068ea66be3b80b7
SHA512bbeaf50e49c7a01e94e192121010701ae1a4e46e9eff8a015fd45ba3b4831dfe0cf5c0392a368b28e9b291575b8b043dde34a33109e454eca5729749d121675d
-
Filesize
655KB
MD5a75bc752c50fb74f7597c2bb59b93d43
SHA1d2dcd3d104b6b04f0828844aeda188798669b41f
SHA256877365dfcbe9d4896e9ca544c7d19e106ab78339edbc1bd410f2e11bd32cd2ee
SHA512e856238e3cb519786365faf17d0d590692fa991d9ca81e2fb8ce094cd090583f4ed1823b7ca9c0f702320398054ba682644a02f8d99d4e0f53733564611d3f97
-
Filesize
44KB
MD50e06054beb13192588e745ee63a84173
SHA130b7d4d1277bafd04a83779fd566a1f834a8d113
SHA256c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768
SHA512251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215