Overview
overview
10Static
static
5EMV Reader....5.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...MV.exe
windows10-ltsc_2021-x64
10EMV Reader...al.rtf
windows10-ltsc_2021-x64
1EMV Reader...cy.rtf
windows10-ltsc_2021-x64
1EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...ll.exe
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3EMV Reader...in.dll
windows10-ltsc_2021-x64
3EMV Reader...rm.dll
windows10-ltsc_2021-x64
3EMV Reader...X1.exe
windows10-ltsc_2021-x64
10EMV Reader...e3.dll
windows10-ltsc_2021-x64
3EMV Reader...b1.dll
windows10-ltsc_2021-x64
3Analysis
-
max time kernel
899s -
max time network
897s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
03/04/2025, 09:22
Static task
static1
Behavioral task
behavioral1
Sample
EMV Reader Writer/EMV Reader Writer/EMV Reader Writer Software V8.5.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral2
Sample
EMV Reader Writer/EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
EMV Reader Writer/EMV.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
EMV Reader Writer/EmvManual.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
EMV Reader Writer/X1 4.1/Cardpeek currency.rtf
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral6
Sample
EMV Reader Writer/X1 4.1/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
EMV Reader Writer/X1 4.1/GlobalPlatform.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral8
Sample
EMV Reader Writer/X1 4.1/bins.dll.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
EMV Reader Writer/X1 4.1/zlib1.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
EMV Reader Writer/X1v5/GPPcScConnectionPlugin.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral11
Sample
EMV Reader Writer/X1v5/GlobalPlatform.dll
Resource
win10ltsc2021-20250313-en
Behavioral task
behavioral12
Sample
EMV Reader Writer/X1v5/X1.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral13
Sample
EMV Reader Writer/X1v5/sqlite3.dll
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral14
Sample
EMV Reader Writer/X1v5/zlib1.dll
Resource
win10ltsc2021-20250314-en
General
-
Target
EMV Reader Writer/X1v5/X1.exe
-
Size
2.0MB
-
MD5
4dcad2976d44b39374049f9ebbc12115
-
SHA1
043b4ce521eea2265c13b25c9177f769d066ce4c
-
SHA256
d22a6211b7d1e90142395aa3c55a6ee6e4bc563409b3fe27a2b19e1a61f5b869
-
SHA512
a8bdf5e42656633fe620af81eb6ba41a67c317925f92b8e8f56303ae5a6847e1f583ff27aef377366810e1e7d78eb9202d369f4ba9598ac043c4e48f6751f0c9
-
SSDEEP
49152:aJqoQryTkMx8aWuClGvkVaAXb4kqNEhjt7QrrePkvvWrv+Y:a4ryTTxelGv0aojhVereWvgGY
Malware Config
Extracted
netwire
local.cable-modem.org:3361
teamviewer.ddns.net:3361
optic.cable-modem.org:3361
teamviewer.ddns.me:3361
logmein.loginto.me:3361
-
activex_autorun
true
-
activex_key
{LYN464PX-ITSA-6EUY-J762-UKD6Y5BMGV3H}
-
copy_executable
true
-
delete_original
false
-
host_id
Milionare
-
install_path
%AppData%\mscftmon\ntsvc32.exe
-
keylogger_dir
%AppData%\metmsfmon\metaolgs.dat\
-
lock_executable
false
-
mutex
cVNWvLvU
-
offline_keylogger
true
-
password
anjing
-
registry_autorun
true
-
startup_name
winipcservices
-
use_mutex
true
Signatures
-
NetWire RAT payload 9 IoCs
resource yara_rule behavioral12/memory/4656-16-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral12/memory/4656-18-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral12/memory/4656-21-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral12/memory/1712-38-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral12/memory/5292-40-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral12/memory/5292-43-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral12/memory/5292-49-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral12/memory/5292-53-0x0000000000400000-0x000000000041F000-memory.dmp netwire behavioral12/memory/5292-56-0x0000000000400000-0x000000000041F000-memory.dmp netwire -
Netwire family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{LYN464PX-ITSA-6EUY-J762-UKD6Y5BMGV3H} ntsvc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{LYN464PX-ITSA-6EUY-J762-UKD6Y5BMGV3H}\StubPath = "\"C:\\Users\\Admin\\AppData\\Roaming\\mscftmon\\ntsvc32.exe\"" ntsvc32.exe -
Executes dropped EXE 7 IoCs
pid Process 6000 win7system.exe 2976 temp.exe 4656 win7system.exe 4856 ntsvc32.exe 5292 ntsvc32.exe 1116 ntsvc32.exe 1712 ntsvc32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winipcservices = "C:\\Users\\Admin\\AppData\\Roaming\\mscftmon\\ntsvc32.exe" ntsvc32.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral12/files/0x00080000000281bb-7.dat autoit_exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 6000 set thread context of 4656 6000 win7system.exe 89 PID 4856 set thread context of 5292 4856 ntsvc32.exe 93 PID 1116 set thread context of 1712 1116 ntsvc32.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win7system.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language temp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win7system.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntsvc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language X1.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell temp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 temp.exe Key created \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 temp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff temp.exe Key created \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 temp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 temp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff temp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" temp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 14002e80922b16d365937a46956b92703aca08af0000 temp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff temp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 temp.exe Key created \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags temp.exe Key created \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 temp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ temp.exe Key created \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings temp.exe Key created \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU temp.exe Key created \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell temp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Documents" temp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1702774510-645589634-1201277210-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff temp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2976 temp.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2976 temp.exe 2976 temp.exe 2976 temp.exe 2976 temp.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5344 wrote to memory of 6000 5344 X1.exe 82 PID 5344 wrote to memory of 6000 5344 X1.exe 82 PID 5344 wrote to memory of 6000 5344 X1.exe 82 PID 5344 wrote to memory of 2976 5344 X1.exe 83 PID 5344 wrote to memory of 2976 5344 X1.exe 83 PID 5344 wrote to memory of 2976 5344 X1.exe 83 PID 6000 wrote to memory of 4656 6000 win7system.exe 89 PID 6000 wrote to memory of 4656 6000 win7system.exe 89 PID 6000 wrote to memory of 4656 6000 win7system.exe 89 PID 6000 wrote to memory of 4656 6000 win7system.exe 89 PID 6000 wrote to memory of 4656 6000 win7system.exe 89 PID 4656 wrote to memory of 4856 4656 win7system.exe 91 PID 4656 wrote to memory of 4856 4656 win7system.exe 91 PID 4656 wrote to memory of 4856 4656 win7system.exe 91 PID 4856 wrote to memory of 5292 4856 ntsvc32.exe 93 PID 4856 wrote to memory of 5292 4856 ntsvc32.exe 93 PID 4856 wrote to memory of 5292 4856 ntsvc32.exe 93 PID 4856 wrote to memory of 5292 4856 ntsvc32.exe 93 PID 4856 wrote to memory of 5292 4856 ntsvc32.exe 93 PID 4272 wrote to memory of 1116 4272 cmd.exe 96 PID 4272 wrote to memory of 1116 4272 cmd.exe 96 PID 4272 wrote to memory of 1116 4272 cmd.exe 96 PID 1116 wrote to memory of 1712 1116 ntsvc32.exe 97 PID 1116 wrote to memory of 1712 1116 ntsvc32.exe 97 PID 1116 wrote to memory of 1712 1116 ntsvc32.exe 97 PID 1116 wrote to memory of 1712 1116 ntsvc32.exe 97 PID 1116 wrote to memory of 1712 1116 ntsvc32.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1v5\X1.exe"C:\Users\Admin\AppData\Local\Temp\EMV Reader Writer\X1v5\X1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5344 -
C:\Users\Admin\AppData\Roaming\win7system.exeC:\Users\Admin\AppData\Roaming/win7system.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6000 -
C:\Users\Admin\AppData\Roaming\win7system.exe"C:\Users\Admin\AppData\Roaming\win7system.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Roaming\mscftmon\ntsvc32.exe"C:\Users\Admin\AppData\Roaming\mscftmon\ntsvc32.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Roaming\mscftmon\ntsvc32.exe"C:\Users\Admin\AppData\Roaming\mscftmon\ntsvc32.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5292
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\temp.exeC:\Users\Admin\AppData\Local\Temp/temp.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\mscftmon\ntsvc32.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Roaming\mscftmon\ntsvc32.exeC:\Users\Admin\AppData\Roaming\mscftmon\ntsvc32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Roaming\mscftmon\ntsvc32.exe"C:\Users\Admin\AppData\Roaming\mscftmon\ntsvc32.exe"3⤵
- Executes dropped EXE
PID:1712
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD54797151867a45824e90fc5c7bb0ce3c0
SHA1febebde0fe81094c1d7d8c96f16b7d9c18e68ee1
SHA2566f24acf9a3ed15b5ef034460850679d7e9df1233386a36fc0a4b787844ee2e2e
SHA5123fa638ae37e82a2767047d8a42ca556df3859d5a432107820b6d9be37aed6dfbb386a39abbb7ae1bd2ed207aaea5724c9c2d36174e967dd38e638d1dd0d3f4bc
-
Filesize
851KB
MD5f0efbb2f387c405af70553af29b330dd
SHA19b495dd76e44621fd20b4372c6df6ec5e573f8a0
SHA25695a48c97cdb26f24143d7dcc52b8897d6516511c453ac7c7d0f7446e01340e3e
SHA5125f5eb19693ed83e458bd55436b49bd3be758312ad71f74150f494597e623d56341fefb4d3fd3243cc9b636b8a1fe80cfb4afbd5b9098cfd1ff1ffc3db4c4bde2