General
-
Target
RNSM00295.7z
-
Size
13.0MB
-
Sample
241117-tz8nxssrfw
-
MD5
44ba5bd71576de83e067960138b8891b
-
SHA1
835e22a76cb3a7ea168390e8c108051adac78752
-
SHA256
8ed4b5d0a5bd733696802b71bc01d317f0add177925a82930edce4b7cc9a907a
-
SHA512
161bdc166f50559720878d8c39a0fb3df5f0bd8bb323f6316fc8d99714e6f8f3d75d63a358cc528b32706399efee2088eda9afe45a2858216655e52c72c0aa8f
-
SSDEEP
393216:Sp2W2xTnEXY4WwHE40lGwiuYAzH5P5q5Dp:223xERHP0lFiuL75PQ9
Static task
static1
Malware Config
Extracted
netwire
micro.loginto.me:3360
c0der.ddns.net:3360
bakbumz.ddns.net:3360
-
activex_autorun
true
-
activex_key
{IGXB136N-WP56-42I3-3EN8-85A00571YU01}
-
copy_executable
true
-
delete_original
false
-
host_id
2016-%Rand%
-
install_path
%AppData%\Install\Notepad.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
parola
-
registry_autorun
true
-
startup_name
Notepad
-
use_mutex
false
Extracted
C:\Users\Admin\Documents\_README_06X86G_.hta
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\_ReCoVeRy_+fmhad.txt
http://t54ndnku456ngkwsudqer.wallymac.com/3959D58DB927D87
http://po4dbsjbneljhrlbvaueqrgveatv.bonmawp.at/3959D58DB927D87
http://hrfgd74nfksjdcnnklnwefvdsf.materdunst.com/3959D58DB927D87
http://xlowfznrg4wf7dli.onion/3959D58DB927D87
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Recovery+tvgdx.txt
http://ytrest84y5i456hghadefdsd.pontogrot.com/BE4BEDB76B6F7551
http://prest54538hnksjn4kjfwdbhwere.hotchunman.com/BE4BEDB76B6F7551
http://5rport45vcdef345adfkksawe.bematvocal.at/BE4BEDB76B6F7551
http://fwgrhsao3aoml7ej.onion/BE4BEDB76B6F7551
http://fwgrhsao3aoml7ej.ONION/BE4BEDB76B6F7551
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\HELP_RECOVER_instructions+rgb.txt
http://pren874bwsdbmbwe.returnyourfiless.ru/BE4BEDB76B6F7551
http://i4sdmjn4fsdsdqfhu12l.orbyscabz.com/BE4BEDB76B6F7551
http://rr48nfhdj5wedsm99324.tuttianent.at/BE4BEDB76B6F7551
http://yez2o5lwqkmlv5lc.onion/BE4BEDB76B6F7551
Targets
-
-
Target
RNSM00295.7z
-
Size
13.0MB
-
MD5
44ba5bd71576de83e067960138b8891b
-
SHA1
835e22a76cb3a7ea168390e8c108051adac78752
-
SHA256
8ed4b5d0a5bd733696802b71bc01d317f0add177925a82930edce4b7cc9a907a
-
SHA512
161bdc166f50559720878d8c39a0fb3df5f0bd8bb323f6316fc8d99714e6f8f3d75d63a358cc528b32706399efee2088eda9afe45a2858216655e52c72c0aa8f
-
SSDEEP
393216:Sp2W2xTnEXY4WwHE40lGwiuYAzH5P5q5Dp:223xERHP0lFiuL75PQ9
-
Modifies WinLogon for persistence
-
NetWire RAT payload
-
Netwire family
-
Troldesh family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies boot configuration data using bcdedit
-
Renames multiple (763) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Clears Network RDP Connection History and Configurations
Remove evidence of malicious network connections to clean up operations traces.
-
Contacts a large (1684) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Disables taskbar notifications via registry modification
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
4Clear Network Connection History and Configurations
1File Deletion
3Modify Registry
8Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Network Service Discovery
1Peripheral Device Discovery
1Query Registry
5System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2