Analysis

  • max time kernel
    151s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    31-07-2020 12:18

General

  • Target

    Solictud_de_cotizacion (3699663-2020).exe

  • Size

    553KB

  • MD5

    748e4a49b7e306d7eb45aaa7b10faf5d

  • SHA1

    ed4e974775f050e65233116fdbb28921618fceb7

  • SHA256

    e232e9c0d66770fe8e50466f3dd073160a8ddaf565ed0382ce997226c1b364dd

  • SHA512

    378f5c0ed4b94405a1287febc6a12901cbc8b386b41b66d9f2d007d704780424f3427b6e6973480656954f3d31540cacdc5e935118d4d561bba1bf399fc8d839

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2723 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Executes dropped EXE 3 IoCs
  • NetWire RAT payload 9 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe
    "C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetThreadContext
    PID:1612
    • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
      "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Orden.pdf"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1072
    • C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe
      "C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Loads dropped DLL
      PID:1056
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
        "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        • Suspicious behavior: MapViewOfSection
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:1716
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Orden.pdf"
          4⤵
            PID:1860
          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            "C:\Users\Admin\AppData\Roaming\Install\Host.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            PID:1888
          • C:\Users\Admin\AppData\Roaming\Install\Host.exe
            "C:\Users\Admin\AppData\Roaming\Install\Host.exe" 2 1888 67985
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Executes dropped EXE
            PID:1948
      • C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe
        "C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe" 2 1056 67236
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe
          "C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetThreadContext
          PID:1776
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Orden.pdf"
            4⤵
              PID:1872
            • C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe
              "C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe"
              4⤵
              • Adds Run key to start application
              PID:1416
            • C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe
              "C:\Users\Admin\AppData\Local\Temp\Solictud_de_cotizacion (3699663-2020).exe" 2 1416 68156
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:1972

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Orden.pdf
      • C:\Users\Admin\AppData\Local\Temp\Orden.pdf
      • C:\Users\Admin\AppData\Local\Temp\Orden.pdf
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
      • C:\Users\Admin\AppData\Roaming\Install\Host.exe
      • \Users\Admin\AppData\Roaming\Install\Host.exe
      • \Users\Admin\AppData\Roaming\Install\Host.exe
      • memory/1056-2-0x000000000040242D-mapping.dmp
      • memory/1056-4-0x0000000000400000-0x0000000000433000-memory.dmp
        Filesize

        204KB

      • memory/1056-1-0x0000000000400000-0x0000000000433000-memory.dmp
        Filesize

        204KB

      • memory/1072-0-0x0000000000000000-mapping.dmp
      • memory/1416-22-0x000000000040242D-mapping.dmp
      • memory/1540-3-0x0000000000000000-mapping.dmp
      • memory/1716-7-0x0000000000000000-mapping.dmp
      • memory/1776-9-0x0000000000000000-mapping.dmp
      • memory/1860-12-0x0000000000000000-mapping.dmp
      • memory/1872-13-0x0000000000000000-mapping.dmp
      • memory/1888-19-0x0000000000400000-0x0000000000433000-memory.dmp
        Filesize

        204KB

      • memory/1888-16-0x000000000040242D-mapping.dmp
      • memory/1948-20-0x0000000000000000-mapping.dmp
      • memory/1972-24-0x0000000000000000-mapping.dmp