General

  • Target

    Proforma Invoice.xls

  • Size

    74KB

  • Sample

    201119-r92d5yaqye

  • MD5

    55db711144ff4a35faf58d982e7cf727

  • SHA1

    ea7b59dde9f0600915069dec66f8410f25cb66fd

  • SHA256

    6e76bd502c91158631cadf485ce44caa4d6504864735593fc23d90477a794d17

  • SHA512

    92e99e23ef71f4b1b9e3f6733ca16d51a2e44a777581c6a4a9b35b4c3574620cbff37ba02052bd7932f75acd2b70a2750f4c53c0d87db75e8a10c4aa1cf4192a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cutt.ly/ZhqUH1O

Targets

    • Target

      Proforma Invoice.xls

    • Size

      74KB

    • MD5

      55db711144ff4a35faf58d982e7cf727

    • SHA1

      ea7b59dde9f0600915069dec66f8410f25cb66fd

    • SHA256

      6e76bd502c91158631cadf485ce44caa4d6504864735593fc23d90477a794d17

    • SHA512

      92e99e23ef71f4b1b9e3f6733ca16d51a2e44a777581c6a4a9b35b4c3574620cbff37ba02052bd7932f75acd2b70a2750f4c53c0d87db75e8a10c4aa1cf4192a

    • NetWire RAT payload

    • Netwire

      Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks