Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-11-2024 07:15
Static task
static1
General
-
Target
SDA EMV Chip Writer By Paws.exe
-
Size
3.8MB
-
MD5
30ee6aaf50e4b4369e0a1634afbcd757
-
SHA1
b2ee5b9c07098a1058ae9778ad59396b8b8c9878
-
SHA256
7f4d0810b884d9647d5374550187a123f009ce8f6450d5dab818a2384358fb06
-
SHA512
bec9661218c6fe09f7c048e4264def14815da93ab258209e3acc2e3e72b5f08aa6f6aea14c24973f2c0abbe3a54f1e820b3f712c8a0d8a8d474d6e19e4b73cec
-
SSDEEP
98304:tMryTmxddk6tVOfALLIVjnz25r/8XnveOZxho:vKxdBt84Ehur/82iPo
Malware Config
Extracted
netwire
local.cable-modem.org:3361
teamviewer.ddns.net:3361
optic.cable-modem.org:3361
teamviewer.ddns.me:3361
logmein.loginto.me:3361
-
activex_autorun
true
-
activex_key
{FV27BA78-2S2J-Y2KF-44D4-X6XR4251FJEB}
-
copy_executable
true
-
delete_original
false
-
host_id
BTC2020
-
install_path
%AppData%\instal\crhomeAT64bit.exe
-
keylogger_dir
%AppData%\0pera\metaolgs.dat\
-
lock_executable
false
-
mutex
NLBJEoGj
-
offline_keylogger
true
-
password
anjing
-
registry_autorun
true
-
startup_name
tvnserver
-
use_mutex
true
Signatures
-
NetWire RAT payload 8 IoCs
resource yara_rule behavioral1/memory/3692-41-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/3692-44-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/3692-45-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/3244-60-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/3244-62-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/3244-64-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/3244-68-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral1/memory/3244-70-0x0000000000400000-0x000000000041F000-memory.dmp netwire -
Netwire family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FV27BA78-2S2J-Y2KF-44D4-X6XR4251FJEB} crhomeAT64bit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FV27BA78-2S2J-Y2KF-44D4-X6XR4251FJEB}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\instal\\crhomeAT64bit.exe\"" crhomeAT64bit.exe -
Executes dropped EXE 5 IoCs
pid Process 4476 Syssvctoolsx64bit.exe 2792 Sdachipwriter.exe 3692 Syssvctoolsx64bit.exe 1380 crhomeAT64bit.exe 3244 crhomeAT64bit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Windows\CurrentVersion\Run\tvnserver = "C:\\Users\\Admin\\AppData\\Roaming\\instal\\crhomeAT64bit.exe" crhomeAT64bit.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x001c00000002aaa1-7.dat autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4476 set thread context of 3692 4476 Syssvctoolsx64bit.exe 82 PID 1380 set thread context of 3244 1380 crhomeAT64bit.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crhomeAT64bit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crhomeAT64bit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SDA EMV Chip Writer By Paws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syssvctoolsx64bit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sdachipwriter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Syssvctoolsx64bit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2792 Sdachipwriter.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3808 wrote to memory of 4476 3808 SDA EMV Chip Writer By Paws.exe 79 PID 3808 wrote to memory of 4476 3808 SDA EMV Chip Writer By Paws.exe 79 PID 3808 wrote to memory of 4476 3808 SDA EMV Chip Writer By Paws.exe 79 PID 3808 wrote to memory of 2792 3808 SDA EMV Chip Writer By Paws.exe 80 PID 3808 wrote to memory of 2792 3808 SDA EMV Chip Writer By Paws.exe 80 PID 3808 wrote to memory of 2792 3808 SDA EMV Chip Writer By Paws.exe 80 PID 4476 wrote to memory of 3692 4476 Syssvctoolsx64bit.exe 82 PID 4476 wrote to memory of 3692 4476 Syssvctoolsx64bit.exe 82 PID 4476 wrote to memory of 3692 4476 Syssvctoolsx64bit.exe 82 PID 4476 wrote to memory of 3692 4476 Syssvctoolsx64bit.exe 82 PID 4476 wrote to memory of 3692 4476 Syssvctoolsx64bit.exe 82 PID 3692 wrote to memory of 1380 3692 Syssvctoolsx64bit.exe 83 PID 3692 wrote to memory of 1380 3692 Syssvctoolsx64bit.exe 83 PID 3692 wrote to memory of 1380 3692 Syssvctoolsx64bit.exe 83 PID 1380 wrote to memory of 3244 1380 crhomeAT64bit.exe 84 PID 1380 wrote to memory of 3244 1380 crhomeAT64bit.exe 84 PID 1380 wrote to memory of 3244 1380 crhomeAT64bit.exe 84 PID 1380 wrote to memory of 3244 1380 crhomeAT64bit.exe 84 PID 1380 wrote to memory of 3244 1380 crhomeAT64bit.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\SDA EMV Chip Writer By Paws.exe"C:\Users\Admin\AppData\Local\Temp\SDA EMV Chip Writer By Paws.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Roaming\Syssvctoolsx64bit.exeC:\Users\Admin\AppData\Roaming/Syssvctoolsx64bit.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Roaming\Syssvctoolsx64bit.exe"C:\Users\Admin\AppData\Roaming\Syssvctoolsx64bit.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Roaming\instal\crhomeAT64bit.exe"C:\Users\Admin\AppData\Roaming\instal\crhomeAT64bit.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\instal\crhomeAT64bit.exe"C:\Users\Admin\AppData\Roaming\instal\crhomeAT64bit.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3244
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Sdachipwriter.exeC:\Users\Admin\AppData\Local\Temp/Sdachipwriter.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD50828480f98adb533104d42ad42601f80
SHA15528665c1e94ec7738174058196d3c818c64241e
SHA2561ecfd3755eba578108363c0705c6ec205972080739ed0fbd17439f8139ba7e08
SHA512c8e87296d06a1cc032dbc78828413c6d1636d506e859f8f5545a0164b73d0d32d7ed7b046aa8108dacd8299b6a587733d870fb45d3e03666e75bc45a4bb3bc65
-
Filesize
753KB
MD5c57711ed5ac9003f30be5d81c0b8ddc1
SHA1f7e14ebd419f4c6c3ba269e1fb6ff765adc5d8b9
SHA256ec94ffbda11b4f750ea732a9986b6dd60d4c87978f810f27336abf4ee178bc03
SHA5122f000b930b6481a2cf4842a1dc04e7a99fb25c29fc21e221fddd7e3bfa299e69a5890dbfc8200cf5cb1191726697bf39e400810f4ee415206f95a6ab24905466