Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
Proof of payment.exe
Resource
win7-20240903-en
General
-
Target
Proof of payment.exe
-
Size
1006KB
-
MD5
7e1d18de24aeff3df526dc7ab6ff05dc
-
SHA1
49f9323be153edc7d4467aa3280f9afc3d6b1533
-
SHA256
629333f4adba87b2412a8c8fa301a25042de764506ea1f369b38fa10c6112547
-
SHA512
999e7c19a26fe755132bba012884410d9a181beaa476aade615f3961e2ca911de988d35d04a196ee76748469ac1a0b1c0330d0a7728d574318872766c364449e
-
SSDEEP
24576:6NA3R5drXdtBeHJePXzHbuzBux7s3oFQYcEn7W:z5bEaxIo6V
Malware Config
Extracted
netwire
185.140.53.220:3363
185.140.53.220:3369
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
NETHERLAND
-
registry_autorun
false
-
use_mutex
false
Signatures
-
NetWire RAT payload 4 IoCs
resource yara_rule behavioral2/memory/2440-53-0x0000000000B00000-0x000000000117C000-memory.dmp netwire behavioral2/memory/2440-50-0x0000000000B00000-0x000000000117C000-memory.dmp netwire behavioral2/memory/2440-54-0x0000000000B00000-0x000000000117C000-memory.dmp netwire behavioral2/memory/2440-55-0x0000000000B00000-0x000000000117C000-memory.dmp netwire -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation Proof of payment.exe -
Executes dropped EXE 2 IoCs
pid Process 2556 niubglejwg.pif 2440 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\71281781\\NIUBGL~1.PIF C:\\Users\\Admin\\71281781\\gtogdqb.cwv" niubglejwg.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 2440 2556 niubglejwg.pif 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Proof of payment.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niubglejwg.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2556 1952 Proof of payment.exe 81 PID 1952 wrote to memory of 2556 1952 Proof of payment.exe 81 PID 1952 wrote to memory of 2556 1952 Proof of payment.exe 81 PID 2556 wrote to memory of 2440 2556 niubglejwg.pif 87 PID 2556 wrote to memory of 2440 2556 niubglejwg.pif 87 PID 2556 wrote to memory of 2440 2556 niubglejwg.pif 87 PID 2556 wrote to memory of 2440 2556 niubglejwg.pif 87 PID 2556 wrote to memory of 2440 2556 niubglejwg.pif 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Proof of payment.exe"C:\Users\Admin\AppData\Local\Temp\Proof of payment.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\71281781\niubglejwg.pif"C:\Users\Admin\71281781\niubglejwg.pif" gtogdqb.cwv2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2440
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
318KB
MD59fd93502039581e1eac27a9fe8167334
SHA1f9fc63483e2f8630adc85ff45549a35b75c1d5ed
SHA256bc56f33ece852ee01fa40fdb375875429e25ae3486ccbd5c1068ea66be3b80b7
SHA512bbeaf50e49c7a01e94e192121010701ae1a4e46e9eff8a015fd45ba3b4831dfe0cf5c0392a368b28e9b291575b8b043dde34a33109e454eca5729749d121675d
-
Filesize
655KB
MD5a75bc752c50fb74f7597c2bb59b93d43
SHA1d2dcd3d104b6b04f0828844aeda188798669b41f
SHA256877365dfcbe9d4896e9ca544c7d19e106ab78339edbc1bd410f2e11bd32cd2ee
SHA512e856238e3cb519786365faf17d0d590692fa991d9ca81e2fb8ce094cd090583f4ed1823b7ca9c0f702320398054ba682644a02f8d99d4e0f53733564611d3f97
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b